Oct 2 19:05:07.649535 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:05:07.649550 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:05:07.649556 kernel: Disabled fast string operations Oct 2 19:05:07.649560 kernel: BIOS-provided physical RAM map: Oct 2 19:05:07.649564 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Oct 2 19:05:07.649568 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Oct 2 19:05:07.649574 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Oct 2 19:05:07.649578 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Oct 2 19:05:07.649582 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Oct 2 19:05:07.649586 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Oct 2 19:05:07.649590 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Oct 2 19:05:07.649594 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Oct 2 19:05:07.649598 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Oct 2 19:05:07.649602 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 2 19:05:07.649608 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Oct 2 19:05:07.649613 kernel: NX (Execute Disable) protection: active Oct 2 19:05:07.649617 kernel: SMBIOS 2.7 present. Oct 2 19:05:07.649622 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Oct 2 19:05:07.649626 kernel: vmware: hypercall mode: 0x00 Oct 2 19:05:07.649630 kernel: Hypervisor detected: VMware Oct 2 19:05:07.649635 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Oct 2 19:05:07.649640 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Oct 2 19:05:07.649644 kernel: vmware: using clock offset of 2863732694 ns Oct 2 19:05:07.649648 kernel: tsc: Detected 3408.000 MHz processor Oct 2 19:05:07.649653 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:05:07.649658 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:05:07.649663 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Oct 2 19:05:07.649667 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:05:07.649672 kernel: total RAM covered: 3072M Oct 2 19:05:07.649677 kernel: Found optimal setting for mtrr clean up Oct 2 19:05:07.649682 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Oct 2 19:05:07.649686 kernel: Using GB pages for direct mapping Oct 2 19:05:07.649691 kernel: ACPI: Early table checksum verification disabled Oct 2 19:05:07.649695 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Oct 2 19:05:07.649700 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Oct 2 19:05:07.649704 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Oct 2 19:05:07.649709 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Oct 2 19:05:07.649713 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 2 19:05:07.649718 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Oct 2 19:05:07.649723 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Oct 2 19:05:07.649730 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Oct 2 19:05:07.649734 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Oct 2 19:05:07.649739 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Oct 2 19:05:07.649744 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Oct 2 19:05:07.649750 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Oct 2 19:05:07.649755 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Oct 2 19:05:07.649760 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Oct 2 19:05:07.649764 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 2 19:05:07.649769 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Oct 2 19:05:07.649774 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Oct 2 19:05:07.649779 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Oct 2 19:05:07.649783 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Oct 2 19:05:07.649788 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Oct 2 19:05:07.649794 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Oct 2 19:05:07.649799 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Oct 2 19:05:07.649804 kernel: system APIC only can use physical flat Oct 2 19:05:07.649808 kernel: Setting APIC routing to physical flat. Oct 2 19:05:07.649813 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:05:07.649818 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 2 19:05:07.649823 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 2 19:05:07.649827 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 2 19:05:07.649832 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 2 19:05:07.649838 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 2 19:05:07.649843 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 2 19:05:07.649847 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 2 19:05:07.649852 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Oct 2 19:05:07.649857 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Oct 2 19:05:07.649861 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Oct 2 19:05:07.649866 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Oct 2 19:05:07.649871 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Oct 2 19:05:07.649876 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Oct 2 19:05:07.649880 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Oct 2 19:05:07.649886 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Oct 2 19:05:07.649891 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Oct 2 19:05:07.649895 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Oct 2 19:05:07.649900 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Oct 2 19:05:07.649905 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Oct 2 19:05:07.649909 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Oct 2 19:05:07.649914 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Oct 2 19:05:07.649919 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Oct 2 19:05:07.649924 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Oct 2 19:05:07.649928 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Oct 2 19:05:07.649934 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Oct 2 19:05:07.649939 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Oct 2 19:05:07.649943 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Oct 2 19:05:07.649948 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Oct 2 19:05:07.649953 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Oct 2 19:05:07.649958 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Oct 2 19:05:07.649962 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Oct 2 19:05:07.649967 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Oct 2 19:05:07.649972 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Oct 2 19:05:07.649977 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Oct 2 19:05:07.649982 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Oct 2 19:05:07.649987 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Oct 2 19:05:07.649992 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Oct 2 19:05:07.649997 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Oct 2 19:05:07.650001 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Oct 2 19:05:07.650006 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Oct 2 19:05:07.650011 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Oct 2 19:05:07.650015 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Oct 2 19:05:07.650020 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Oct 2 19:05:07.650025 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Oct 2 19:05:07.650031 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Oct 2 19:05:07.650035 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Oct 2 19:05:07.650040 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Oct 2 19:05:07.650045 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Oct 2 19:05:07.650049 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Oct 2 19:05:07.650054 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Oct 2 19:05:07.650059 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Oct 2 19:05:07.650064 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Oct 2 19:05:07.650068 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Oct 2 19:05:07.650073 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Oct 2 19:05:07.650079 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Oct 2 19:05:07.650083 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Oct 2 19:05:07.650088 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Oct 2 19:05:07.650093 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Oct 2 19:05:07.650097 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Oct 2 19:05:07.650102 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Oct 2 19:05:07.650111 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Oct 2 19:05:07.650117 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Oct 2 19:05:07.650122 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Oct 2 19:05:07.650127 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Oct 2 19:05:07.650132 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Oct 2 19:05:07.650138 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Oct 2 19:05:07.650143 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Oct 2 19:05:07.650148 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Oct 2 19:05:07.650153 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Oct 2 19:05:07.650159 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Oct 2 19:05:07.650164 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Oct 2 19:05:07.650169 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Oct 2 19:05:07.650175 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Oct 2 19:05:07.650180 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Oct 2 19:05:07.650185 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Oct 2 19:05:07.650190 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Oct 2 19:05:07.650195 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Oct 2 19:05:07.650200 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Oct 2 19:05:07.650205 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Oct 2 19:05:07.650210 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Oct 2 19:05:07.650215 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Oct 2 19:05:07.650220 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Oct 2 19:05:07.650226 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Oct 2 19:05:07.650232 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Oct 2 19:05:07.650237 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Oct 2 19:05:07.650242 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Oct 2 19:05:07.650247 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Oct 2 19:05:07.650252 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Oct 2 19:05:07.650257 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Oct 2 19:05:07.650262 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Oct 2 19:05:07.650267 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Oct 2 19:05:07.650273 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Oct 2 19:05:07.650278 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Oct 2 19:05:07.650283 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Oct 2 19:05:07.650288 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Oct 2 19:05:07.650293 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Oct 2 19:05:07.650298 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Oct 2 19:05:07.650303 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Oct 2 19:05:07.650308 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Oct 2 19:05:07.650314 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Oct 2 19:05:07.650318 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Oct 2 19:05:07.650324 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Oct 2 19:05:07.650329 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Oct 2 19:05:07.650334 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Oct 2 19:05:07.650340 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Oct 2 19:05:07.650345 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Oct 2 19:05:07.650350 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Oct 2 19:05:07.650355 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Oct 2 19:05:07.650360 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Oct 2 19:05:07.650365 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Oct 2 19:05:07.650370 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Oct 2 19:05:07.650376 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Oct 2 19:05:07.650381 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Oct 2 19:05:07.650386 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Oct 2 19:05:07.650391 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Oct 2 19:05:07.650396 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Oct 2 19:05:07.650401 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Oct 2 19:05:07.650406 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Oct 2 19:05:07.650411 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Oct 2 19:05:07.650416 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Oct 2 19:05:07.650421 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Oct 2 19:05:07.650427 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Oct 2 19:05:07.650432 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Oct 2 19:05:07.650437 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Oct 2 19:05:07.650443 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Oct 2 19:05:07.650447 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Oct 2 19:05:07.650453 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Oct 2 19:05:07.650458 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 2 19:05:07.650463 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 2 19:05:07.650468 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Oct 2 19:05:07.650476 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Oct 2 19:05:07.650486 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Oct 2 19:05:07.650495 kernel: Zone ranges: Oct 2 19:05:07.650511 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:05:07.651958 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Oct 2 19:05:07.651965 kernel: Normal empty Oct 2 19:05:07.651971 kernel: Movable zone start for each node Oct 2 19:05:07.651976 kernel: Early memory node ranges Oct 2 19:05:07.651981 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Oct 2 19:05:07.651986 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Oct 2 19:05:07.651997 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Oct 2 19:05:07.652003 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Oct 2 19:05:07.652008 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:05:07.652013 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Oct 2 19:05:07.652018 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Oct 2 19:05:07.652024 kernel: ACPI: PM-Timer IO Port: 0x1008 Oct 2 19:05:07.652029 kernel: system APIC only can use physical flat Oct 2 19:05:07.652034 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Oct 2 19:05:07.652039 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 2 19:05:07.652045 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 2 19:05:07.652051 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 2 19:05:07.652056 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 2 19:05:07.652061 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 2 19:05:07.652066 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 2 19:05:07.652071 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 2 19:05:07.652076 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 2 19:05:07.652081 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 2 19:05:07.652086 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 2 19:05:07.652091 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 2 19:05:07.652097 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 2 19:05:07.652103 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 2 19:05:07.652108 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 2 19:05:07.652113 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 2 19:05:07.652118 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 2 19:05:07.652123 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Oct 2 19:05:07.652128 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Oct 2 19:05:07.652133 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Oct 2 19:05:07.652138 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Oct 2 19:05:07.652144 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Oct 2 19:05:07.652150 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Oct 2 19:05:07.652155 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Oct 2 19:05:07.652160 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Oct 2 19:05:07.652165 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Oct 2 19:05:07.652170 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Oct 2 19:05:07.652175 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Oct 2 19:05:07.652180 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Oct 2 19:05:07.652185 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Oct 2 19:05:07.652191 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Oct 2 19:05:07.652197 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Oct 2 19:05:07.652202 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Oct 2 19:05:07.652207 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Oct 2 19:05:07.652212 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Oct 2 19:05:07.652217 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Oct 2 19:05:07.652222 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Oct 2 19:05:07.652227 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Oct 2 19:05:07.652232 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Oct 2 19:05:07.652238 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Oct 2 19:05:07.652244 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Oct 2 19:05:07.652249 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Oct 2 19:05:07.652254 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Oct 2 19:05:07.652259 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Oct 2 19:05:07.652265 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Oct 2 19:05:07.652270 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Oct 2 19:05:07.652275 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Oct 2 19:05:07.652280 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Oct 2 19:05:07.652285 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Oct 2 19:05:07.652290 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Oct 2 19:05:07.652296 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Oct 2 19:05:07.652301 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Oct 2 19:05:07.652307 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Oct 2 19:05:07.652312 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Oct 2 19:05:07.652317 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Oct 2 19:05:07.652322 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Oct 2 19:05:07.652327 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Oct 2 19:05:07.652332 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Oct 2 19:05:07.652338 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Oct 2 19:05:07.652344 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Oct 2 19:05:07.652349 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Oct 2 19:05:07.652354 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Oct 2 19:05:07.652359 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Oct 2 19:05:07.652364 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Oct 2 19:05:07.652369 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Oct 2 19:05:07.652375 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Oct 2 19:05:07.652380 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Oct 2 19:05:07.652385 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Oct 2 19:05:07.652391 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Oct 2 19:05:07.652396 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Oct 2 19:05:07.652401 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Oct 2 19:05:07.652406 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Oct 2 19:05:07.652411 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Oct 2 19:05:07.652417 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Oct 2 19:05:07.652422 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Oct 2 19:05:07.652427 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Oct 2 19:05:07.652432 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Oct 2 19:05:07.652437 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Oct 2 19:05:07.652443 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Oct 2 19:05:07.652448 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Oct 2 19:05:07.652453 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Oct 2 19:05:07.652458 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Oct 2 19:05:07.652463 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Oct 2 19:05:07.652468 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Oct 2 19:05:07.652473 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Oct 2 19:05:07.652478 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Oct 2 19:05:07.652484 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Oct 2 19:05:07.652490 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Oct 2 19:05:07.652495 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Oct 2 19:05:07.652508 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Oct 2 19:05:07.652513 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Oct 2 19:05:07.652518 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Oct 2 19:05:07.652523 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Oct 2 19:05:07.652528 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Oct 2 19:05:07.652533 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Oct 2 19:05:07.652539 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Oct 2 19:05:07.652544 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Oct 2 19:05:07.652550 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Oct 2 19:05:07.652555 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Oct 2 19:05:07.652560 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Oct 2 19:05:07.652565 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Oct 2 19:05:07.652570 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Oct 2 19:05:07.652576 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Oct 2 19:05:07.652581 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Oct 2 19:05:07.652586 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Oct 2 19:05:07.652591 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Oct 2 19:05:07.652597 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Oct 2 19:05:07.652602 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Oct 2 19:05:07.652607 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Oct 2 19:05:07.652612 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Oct 2 19:05:07.652617 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Oct 2 19:05:07.652623 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Oct 2 19:05:07.652628 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Oct 2 19:05:07.652633 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Oct 2 19:05:07.652638 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Oct 2 19:05:07.652643 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Oct 2 19:05:07.652649 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Oct 2 19:05:07.652654 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Oct 2 19:05:07.652659 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Oct 2 19:05:07.652665 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Oct 2 19:05:07.652670 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Oct 2 19:05:07.652675 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Oct 2 19:05:07.652680 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Oct 2 19:05:07.652685 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Oct 2 19:05:07.652690 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Oct 2 19:05:07.652696 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Oct 2 19:05:07.652701 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Oct 2 19:05:07.652707 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Oct 2 19:05:07.652712 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:05:07.652717 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Oct 2 19:05:07.652722 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:05:07.652727 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Oct 2 19:05:07.652733 kernel: TSC deadline timer available Oct 2 19:05:07.652738 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Oct 2 19:05:07.652744 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Oct 2 19:05:07.652749 kernel: Booting paravirtualized kernel on VMware hypervisor Oct 2 19:05:07.652755 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:05:07.652760 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Oct 2 19:05:07.652765 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Oct 2 19:05:07.652770 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Oct 2 19:05:07.652775 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Oct 2 19:05:07.652781 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Oct 2 19:05:07.652786 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Oct 2 19:05:07.652792 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Oct 2 19:05:07.652797 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Oct 2 19:05:07.652802 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Oct 2 19:05:07.652807 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Oct 2 19:05:07.652819 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Oct 2 19:05:07.652825 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Oct 2 19:05:07.652830 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Oct 2 19:05:07.652836 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Oct 2 19:05:07.652841 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Oct 2 19:05:07.652847 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Oct 2 19:05:07.652853 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Oct 2 19:05:07.652858 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Oct 2 19:05:07.652864 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Oct 2 19:05:07.652869 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Oct 2 19:05:07.652874 kernel: Policy zone: DMA32 Oct 2 19:05:07.652881 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:05:07.652887 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:05:07.652893 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Oct 2 19:05:07.652899 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Oct 2 19:05:07.652904 kernel: printk: log_buf_len min size: 262144 bytes Oct 2 19:05:07.652910 kernel: printk: log_buf_len: 1048576 bytes Oct 2 19:05:07.652915 kernel: printk: early log buf free: 239728(91%) Oct 2 19:05:07.652922 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:05:07.652928 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:05:07.652933 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:05:07.652939 kernel: Memory: 1942952K/2096628K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 153416K reserved, 0K cma-reserved) Oct 2 19:05:07.652946 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Oct 2 19:05:07.652951 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:05:07.652957 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:05:07.652963 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:05:07.652969 kernel: rcu: RCU event tracing is enabled. Oct 2 19:05:07.652975 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Oct 2 19:05:07.652982 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:05:07.652987 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:05:07.652993 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:05:07.652998 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Oct 2 19:05:07.653004 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Oct 2 19:05:07.653010 kernel: random: crng init done Oct 2 19:05:07.653015 kernel: Console: colour VGA+ 80x25 Oct 2 19:05:07.653021 kernel: printk: console [tty0] enabled Oct 2 19:05:07.653026 kernel: printk: console [ttyS0] enabled Oct 2 19:05:07.653033 kernel: ACPI: Core revision 20210730 Oct 2 19:05:07.653038 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Oct 2 19:05:07.653044 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:05:07.653050 kernel: x2apic enabled Oct 2 19:05:07.653055 kernel: Switched APIC routing to physical x2apic. Oct 2 19:05:07.653061 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 2 19:05:07.653066 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 2 19:05:07.653072 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Oct 2 19:05:07.653078 kernel: Disabled fast string operations Oct 2 19:05:07.653084 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:05:07.653090 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:05:07.653095 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:05:07.653101 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 2 19:05:07.653107 kernel: Spectre V2 : Mitigation: Enhanced IBRS Oct 2 19:05:07.653113 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:05:07.653118 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 2 19:05:07.653124 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 2 19:05:07.653129 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:05:07.653136 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:05:07.653141 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:05:07.653147 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 2 19:05:07.653152 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:05:07.653158 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:05:07.653163 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:05:07.653169 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:05:07.653174 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:05:07.653180 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Oct 2 19:05:07.653187 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:05:07.653192 kernel: pid_max: default: 131072 minimum: 1024 Oct 2 19:05:07.653198 kernel: LSM: Security Framework initializing Oct 2 19:05:07.653203 kernel: SELinux: Initializing. Oct 2 19:05:07.653209 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:05:07.653214 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:05:07.653220 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 2 19:05:07.653225 kernel: Performance Events: Skylake events, core PMU driver. Oct 2 19:05:07.653232 kernel: core: CPUID marked event: 'cpu cycles' unavailable Oct 2 19:05:07.653237 kernel: core: CPUID marked event: 'instructions' unavailable Oct 2 19:05:07.653243 kernel: core: CPUID marked event: 'bus cycles' unavailable Oct 2 19:05:07.653248 kernel: core: CPUID marked event: 'cache references' unavailable Oct 2 19:05:07.653254 kernel: core: CPUID marked event: 'cache misses' unavailable Oct 2 19:05:07.653259 kernel: core: CPUID marked event: 'branch instructions' unavailable Oct 2 19:05:07.653265 kernel: core: CPUID marked event: 'branch misses' unavailable Oct 2 19:05:07.653270 kernel: ... version: 1 Oct 2 19:05:07.653275 kernel: ... bit width: 48 Oct 2 19:05:07.653282 kernel: ... generic registers: 4 Oct 2 19:05:07.653288 kernel: ... value mask: 0000ffffffffffff Oct 2 19:05:07.653293 kernel: ... max period: 000000007fffffff Oct 2 19:05:07.653299 kernel: ... fixed-purpose events: 0 Oct 2 19:05:07.653305 kernel: ... event mask: 000000000000000f Oct 2 19:05:07.653311 kernel: signal: max sigframe size: 1776 Oct 2 19:05:07.653316 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:05:07.653322 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:05:07.653327 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:05:07.653334 kernel: x86: Booting SMP configuration: Oct 2 19:05:07.653340 kernel: .... node #0, CPUs: #1 Oct 2 19:05:07.653345 kernel: Disabled fast string operations Oct 2 19:05:07.653351 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Oct 2 19:05:07.653356 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 2 19:05:07.653362 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:05:07.653367 kernel: smpboot: Max logical packages: 128 Oct 2 19:05:07.653373 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Oct 2 19:05:07.653378 kernel: devtmpfs: initialized Oct 2 19:05:07.653384 kernel: x86/mm: Memory block size: 128MB Oct 2 19:05:07.653390 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Oct 2 19:05:07.653396 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:05:07.653402 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Oct 2 19:05:07.653407 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:05:07.653413 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:05:07.653418 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:05:07.653424 kernel: audit: type=2000 audit(1696273506.057:1): state=initialized audit_enabled=0 res=1 Oct 2 19:05:07.653429 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:05:07.653435 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:05:07.653441 kernel: cpuidle: using governor menu Oct 2 19:05:07.653447 kernel: Simple Boot Flag at 0x36 set to 0x80 Oct 2 19:05:07.653452 kernel: ACPI: bus type PCI registered Oct 2 19:05:07.653458 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:05:07.653463 kernel: dca service started, version 1.12.1 Oct 2 19:05:07.653469 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Oct 2 19:05:07.653475 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Oct 2 19:05:07.653480 kernel: PCI: Using configuration type 1 for base access Oct 2 19:05:07.653486 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:05:07.653492 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:05:07.657746 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:05:07.657758 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:05:07.657764 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:05:07.657770 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:05:07.657776 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:05:07.657782 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:05:07.657787 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:05:07.657793 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:05:07.657801 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:05:07.657807 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Oct 2 19:05:07.657812 kernel: ACPI: Interpreter enabled Oct 2 19:05:07.657818 kernel: ACPI: PM: (supports S0 S1 S5) Oct 2 19:05:07.657824 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:05:07.657829 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:05:07.657835 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Oct 2 19:05:07.657841 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Oct 2 19:05:07.657912 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:05:07.657963 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Oct 2 19:05:07.658011 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Oct 2 19:05:07.658019 kernel: PCI host bridge to bus 0000:00 Oct 2 19:05:07.658064 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:05:07.658104 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Oct 2 19:05:07.658142 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Oct 2 19:05:07.658183 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Oct 2 19:05:07.658221 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Oct 2 19:05:07.658261 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 2 19:05:07.658300 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:05:07.658339 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Oct 2 19:05:07.658377 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Oct 2 19:05:07.658428 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Oct 2 19:05:07.658479 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Oct 2 19:05:07.658565 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Oct 2 19:05:07.658618 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Oct 2 19:05:07.658663 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Oct 2 19:05:07.658708 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 2 19:05:07.658752 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 2 19:05:07.658799 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 2 19:05:07.658843 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 2 19:05:07.658891 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Oct 2 19:05:07.658936 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Oct 2 19:05:07.658980 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Oct 2 19:05:07.659046 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Oct 2 19:05:07.659106 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Oct 2 19:05:07.659154 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Oct 2 19:05:07.659202 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Oct 2 19:05:07.659247 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Oct 2 19:05:07.659291 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Oct 2 19:05:07.659335 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Oct 2 19:05:07.659377 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Oct 2 19:05:07.659422 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:05:07.659472 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Oct 2 19:05:07.659556 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.659612 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.659662 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.659708 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.659757 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.659805 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.659853 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.659899 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.659949 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.659995 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660044 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660092 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660140 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660186 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660233 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660278 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660326 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660374 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660423 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660469 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660525 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660572 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660620 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660668 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660718 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660763 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.660811 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.660856 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.663345 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.663407 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.663460 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.663515 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.663566 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.663614 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.663664 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.663712 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.663761 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.663807 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.663855 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.663902 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.663951 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.663998 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664048 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664093 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664141 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664187 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664235 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664281 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664332 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664377 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664427 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664471 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664532 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664580 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664631 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664676 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664724 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664769 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664820 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664865 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.664915 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.664961 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.665009 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Oct 2 19:05:07.665054 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.665101 kernel: pci_bus 0000:01: extended config space not accessible Oct 2 19:05:07.665148 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 19:05:07.665197 kernel: pci_bus 0000:02: extended config space not accessible Oct 2 19:05:07.665206 kernel: acpiphp: Slot [32] registered Oct 2 19:05:07.665212 kernel: acpiphp: Slot [33] registered Oct 2 19:05:07.665217 kernel: acpiphp: Slot [34] registered Oct 2 19:05:07.665223 kernel: acpiphp: Slot [35] registered Oct 2 19:05:07.665229 kernel: acpiphp: Slot [36] registered Oct 2 19:05:07.665235 kernel: acpiphp: Slot [37] registered Oct 2 19:05:07.665240 kernel: acpiphp: Slot [38] registered Oct 2 19:05:07.665246 kernel: acpiphp: Slot [39] registered Oct 2 19:05:07.665253 kernel: acpiphp: Slot [40] registered Oct 2 19:05:07.665259 kernel: acpiphp: Slot [41] registered Oct 2 19:05:07.665264 kernel: acpiphp: Slot [42] registered Oct 2 19:05:07.665270 kernel: acpiphp: Slot [43] registered Oct 2 19:05:07.665275 kernel: acpiphp: Slot [44] registered Oct 2 19:05:07.665281 kernel: acpiphp: Slot [45] registered Oct 2 19:05:07.665287 kernel: acpiphp: Slot [46] registered Oct 2 19:05:07.665292 kernel: acpiphp: Slot [47] registered Oct 2 19:05:07.665298 kernel: acpiphp: Slot [48] registered Oct 2 19:05:07.665303 kernel: acpiphp: Slot [49] registered Oct 2 19:05:07.665310 kernel: acpiphp: Slot [50] registered Oct 2 19:05:07.665315 kernel: acpiphp: Slot [51] registered Oct 2 19:05:07.665321 kernel: acpiphp: Slot [52] registered Oct 2 19:05:07.665327 kernel: acpiphp: Slot [53] registered Oct 2 19:05:07.665332 kernel: acpiphp: Slot [54] registered Oct 2 19:05:07.665338 kernel: acpiphp: Slot [55] registered Oct 2 19:05:07.665343 kernel: acpiphp: Slot [56] registered Oct 2 19:05:07.665349 kernel: acpiphp: Slot [57] registered Oct 2 19:05:07.665354 kernel: acpiphp: Slot [58] registered Oct 2 19:05:07.665361 kernel: acpiphp: Slot [59] registered Oct 2 19:05:07.665367 kernel: acpiphp: Slot [60] registered Oct 2 19:05:07.665372 kernel: acpiphp: Slot [61] registered Oct 2 19:05:07.665378 kernel: acpiphp: Slot [62] registered Oct 2 19:05:07.665383 kernel: acpiphp: Slot [63] registered Oct 2 19:05:07.665428 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Oct 2 19:05:07.665473 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 2 19:05:07.665559 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 2 19:05:07.665606 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 2 19:05:07.665653 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Oct 2 19:05:07.665698 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Oct 2 19:05:07.665742 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Oct 2 19:05:07.665786 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Oct 2 19:05:07.665831 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Oct 2 19:05:07.665875 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Oct 2 19:05:07.665919 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Oct 2 19:05:07.665966 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Oct 2 19:05:07.666020 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Oct 2 19:05:07.666067 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Oct 2 19:05:07.666113 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Oct 2 19:05:07.666159 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 2 19:05:07.666204 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 2 19:05:07.666251 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 2 19:05:07.666299 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 2 19:05:07.666344 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 2 19:05:07.666390 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 2 19:05:07.666435 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 2 19:05:07.666479 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 2 19:05:07.666531 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 2 19:05:07.666576 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 2 19:05:07.666622 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 2 19:05:07.666670 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 2 19:05:07.666715 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 2 19:05:07.666760 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 2 19:05:07.666805 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 2 19:05:07.666850 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 2 19:05:07.666896 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 2 19:05:07.666943 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 2 19:05:07.666988 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 2 19:05:07.667034 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 2 19:05:07.667089 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 2 19:05:07.667135 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 2 19:05:07.667178 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 2 19:05:07.667226 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 2 19:05:07.667270 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 2 19:05:07.667314 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 2 19:05:07.667358 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 2 19:05:07.667402 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 2 19:05:07.667447 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 2 19:05:07.667561 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Oct 2 19:05:07.667615 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Oct 2 19:05:07.667663 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Oct 2 19:05:07.667709 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Oct 2 19:05:07.667755 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Oct 2 19:05:07.667800 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Oct 2 19:05:07.667846 kernel: pci 0000:0b:00.0: supports D1 D2 Oct 2 19:05:07.667892 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 19:05:07.667938 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Oct 2 19:05:07.667985 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 2 19:05:07.668030 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 2 19:05:07.668074 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 2 19:05:07.668118 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 2 19:05:07.668163 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 2 19:05:07.668207 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 2 19:05:07.668251 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 2 19:05:07.668297 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 2 19:05:07.668351 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 2 19:05:07.668452 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 2 19:05:07.668507 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 2 19:05:07.668559 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 2 19:05:07.668604 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 2 19:05:07.668649 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 2 19:05:07.668746 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 2 19:05:07.668800 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 2 19:05:07.668852 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 2 19:05:07.668993 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 2 19:05:07.669047 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 2 19:05:07.669111 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 2 19:05:07.669169 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 2 19:05:07.669234 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 2 19:05:07.669301 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 2 19:05:07.669366 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 2 19:05:07.669437 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 2 19:05:07.669487 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 2 19:05:07.670447 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 2 19:05:07.670537 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 2 19:05:07.670598 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 2 19:05:07.670656 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 2 19:05:07.670722 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 2 19:05:07.670789 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 2 19:05:07.670855 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 2 19:05:07.670908 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 2 19:05:07.670967 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 2 19:05:07.671027 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 2 19:05:07.671092 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 2 19:05:07.671154 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 2 19:05:07.671213 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 2 19:05:07.671261 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 2 19:05:07.671305 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 2 19:05:07.671351 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 2 19:05:07.671395 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 2 19:05:07.671440 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 2 19:05:07.671484 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 2 19:05:07.677889 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 2 19:05:07.677942 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 2 19:05:07.677995 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 2 19:05:07.678040 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 2 19:05:07.678085 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 2 19:05:07.678130 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 2 19:05:07.678174 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 2 19:05:07.678218 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 2 19:05:07.678263 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 2 19:05:07.678307 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 2 19:05:07.678353 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 2 19:05:07.678397 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 2 19:05:07.678442 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 2 19:05:07.678485 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 2 19:05:07.680560 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 2 19:05:07.680614 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 2 19:05:07.680663 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 2 19:05:07.680711 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 2 19:05:07.680756 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 2 19:05:07.680802 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 2 19:05:07.680846 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 2 19:05:07.680890 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 2 19:05:07.680934 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 2 19:05:07.680978 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 2 19:05:07.681025 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 2 19:05:07.681072 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 2 19:05:07.681117 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 2 19:05:07.681161 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 2 19:05:07.681206 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 2 19:05:07.681249 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 2 19:05:07.681292 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 2 19:05:07.681337 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 2 19:05:07.681381 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 2 19:05:07.681424 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 2 19:05:07.681434 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Oct 2 19:05:07.681440 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Oct 2 19:05:07.681446 kernel: ACPI: PCI: Interrupt link LNKB disabled Oct 2 19:05:07.681451 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:05:07.681457 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Oct 2 19:05:07.681463 kernel: iommu: Default domain type: Translated Oct 2 19:05:07.681468 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:05:07.681521 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Oct 2 19:05:07.681569 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:05:07.681613 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Oct 2 19:05:07.681621 kernel: vgaarb: loaded Oct 2 19:05:07.681627 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:05:07.681633 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:05:07.681638 kernel: PTP clock support registered Oct 2 19:05:07.681644 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:05:07.681650 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:05:07.681655 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Oct 2 19:05:07.681662 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Oct 2 19:05:07.681668 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Oct 2 19:05:07.681674 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Oct 2 19:05:07.681679 kernel: clocksource: Switched to clocksource tsc-early Oct 2 19:05:07.681685 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:05:07.681691 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:05:07.681696 kernel: pnp: PnP ACPI init Oct 2 19:05:07.681742 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Oct 2 19:05:07.681784 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Oct 2 19:05:07.681827 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Oct 2 19:05:07.681872 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Oct 2 19:05:07.681916 kernel: pnp 00:06: [dma 2] Oct 2 19:05:07.681960 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Oct 2 19:05:07.682005 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Oct 2 19:05:07.682045 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Oct 2 19:05:07.682054 kernel: pnp: PnP ACPI: found 8 devices Oct 2 19:05:07.682060 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:05:07.682066 kernel: NET: Registered PF_INET protocol family Oct 2 19:05:07.682072 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:05:07.682077 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:05:07.682083 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:05:07.682089 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:05:07.682094 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:05:07.682100 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:05:07.682107 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:05:07.682113 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:05:07.682118 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:05:07.682125 kernel: NET: Registered PF_XDP protocol family Oct 2 19:05:07.682170 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Oct 2 19:05:07.682217 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 2 19:05:07.682263 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 2 19:05:07.682311 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 2 19:05:07.682356 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 2 19:05:07.682401 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Oct 2 19:05:07.682447 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Oct 2 19:05:07.682493 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Oct 2 19:05:07.683630 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Oct 2 19:05:07.683684 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Oct 2 19:05:07.683732 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Oct 2 19:05:07.683779 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Oct 2 19:05:07.683824 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Oct 2 19:05:07.683870 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Oct 2 19:05:07.684135 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Oct 2 19:05:07.684192 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Oct 2 19:05:07.684239 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Oct 2 19:05:07.684285 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Oct 2 19:05:07.684335 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Oct 2 19:05:07.684381 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Oct 2 19:05:07.684425 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Oct 2 19:05:07.684472 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Oct 2 19:05:07.685224 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Oct 2 19:05:07.685279 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Oct 2 19:05:07.685329 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Oct 2 19:05:07.685381 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.685427 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.685475 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.686583 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.686636 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.686684 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.686730 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.686775 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.686993 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.687044 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.687092 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.687417 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.687469 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.687587 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.687637 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.687683 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.687879 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.687931 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.687977 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688025 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688071 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688115 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688160 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688203 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688248 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688292 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688336 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688383 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688427 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688471 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688533 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688581 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688625 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688670 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688714 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688762 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688807 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688851 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688895 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.688939 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.688983 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.689035 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.689080 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.689125 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.689170 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.689215 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.689260 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.689304 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.689348 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.689392 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.689436 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.689480 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.692716 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.692767 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.692814 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.692859 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.692904 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.692974 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.693058 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.693115 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.693198 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.693245 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.693293 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.693339 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.693384 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.693429 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.693474 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.693817 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.693874 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.693922 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.693969 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.698631 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.698695 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.698744 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.698792 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.698837 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.698883 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.698928 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.698973 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.699023 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.699068 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.699115 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.699160 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Oct 2 19:05:07.699205 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Oct 2 19:05:07.699250 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 19:05:07.699295 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Oct 2 19:05:07.699341 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Oct 2 19:05:07.699385 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Oct 2 19:05:07.699428 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 2 19:05:07.699479 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Oct 2 19:05:07.699858 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Oct 2 19:05:07.699910 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Oct 2 19:05:07.699964 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Oct 2 19:05:07.700010 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Oct 2 19:05:07.700058 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Oct 2 19:05:07.700103 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Oct 2 19:05:07.700148 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Oct 2 19:05:07.700193 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Oct 2 19:05:07.700243 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Oct 2 19:05:07.700288 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Oct 2 19:05:07.700333 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Oct 2 19:05:07.700378 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Oct 2 19:05:07.700423 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Oct 2 19:05:07.700467 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Oct 2 19:05:07.700727 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Oct 2 19:05:07.700783 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Oct 2 19:05:07.700831 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Oct 2 19:05:07.700877 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 2 19:05:07.700922 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Oct 2 19:05:07.700967 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Oct 2 19:05:07.701016 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Oct 2 19:05:07.701062 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Oct 2 19:05:07.701107 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Oct 2 19:05:07.701153 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Oct 2 19:05:07.701198 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Oct 2 19:05:07.701241 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Oct 2 19:05:07.701305 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Oct 2 19:05:07.701574 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Oct 2 19:05:07.701626 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Oct 2 19:05:07.701675 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Oct 2 19:05:07.701724 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Oct 2 19:05:07.701773 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Oct 2 19:05:07.701825 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Oct 2 19:05:07.701870 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Oct 2 19:05:07.701915 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Oct 2 19:05:07.701959 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Oct 2 19:05:07.702010 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Oct 2 19:05:07.702055 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Oct 2 19:05:07.702100 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Oct 2 19:05:07.702145 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Oct 2 19:05:07.702190 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Oct 2 19:05:07.702234 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Oct 2 19:05:07.702281 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 2 19:05:07.702325 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Oct 2 19:05:07.702370 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Oct 2 19:05:07.702414 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 2 19:05:07.702460 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Oct 2 19:05:07.702761 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Oct 2 19:05:07.702814 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Oct 2 19:05:07.702862 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Oct 2 19:05:07.702908 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Oct 2 19:05:07.702956 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Oct 2 19:05:07.703002 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Oct 2 19:05:07.703047 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Oct 2 19:05:07.703092 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 2 19:05:07.703139 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Oct 2 19:05:07.703185 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Oct 2 19:05:07.703230 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Oct 2 19:05:07.703275 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 2 19:05:07.703320 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Oct 2 19:05:07.703366 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Oct 2 19:05:07.703412 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Oct 2 19:05:07.703457 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Oct 2 19:05:07.703536 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Oct 2 19:05:07.703583 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Oct 2 19:05:07.703626 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Oct 2 19:05:07.703670 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Oct 2 19:05:07.703715 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Oct 2 19:05:07.703759 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Oct 2 19:05:07.703802 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 2 19:05:07.703848 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Oct 2 19:05:07.703893 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Oct 2 19:05:07.703936 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 2 19:05:07.703980 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Oct 2 19:05:07.704023 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Oct 2 19:05:07.704066 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Oct 2 19:05:07.704110 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Oct 2 19:05:07.704154 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Oct 2 19:05:07.704197 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Oct 2 19:05:07.704241 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Oct 2 19:05:07.704286 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Oct 2 19:05:07.704330 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 2 19:05:07.704375 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Oct 2 19:05:07.704419 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Oct 2 19:05:07.704463 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Oct 2 19:05:07.704514 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Oct 2 19:05:07.704561 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Oct 2 19:05:07.704606 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Oct 2 19:05:07.704650 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Oct 2 19:05:07.704697 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Oct 2 19:05:07.704741 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Oct 2 19:05:07.704786 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Oct 2 19:05:07.704830 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Oct 2 19:05:07.704874 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Oct 2 19:05:07.704918 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Oct 2 19:05:07.704963 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 2 19:05:07.705012 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Oct 2 19:05:07.705056 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Oct 2 19:05:07.705100 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Oct 2 19:05:07.705321 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Oct 2 19:05:07.705373 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Oct 2 19:05:07.705420 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Oct 2 19:05:07.705466 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Oct 2 19:05:07.705584 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Oct 2 19:05:07.705634 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Oct 2 19:05:07.705680 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Oct 2 19:05:07.705725 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Oct 2 19:05:07.705770 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 2 19:05:07.705818 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Oct 2 19:05:07.705859 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Oct 2 19:05:07.705897 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Oct 2 19:05:07.706217 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Oct 2 19:05:07.706265 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Oct 2 19:05:07.706306 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Oct 2 19:05:07.706346 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Oct 2 19:05:07.706387 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Oct 2 19:05:07.706431 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Oct 2 19:05:07.706471 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Oct 2 19:05:07.706557 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Oct 2 19:05:07.706599 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Oct 2 19:05:07.706639 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Oct 2 19:05:07.706679 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Oct 2 19:05:07.706721 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Oct 2 19:05:07.706761 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Oct 2 19:05:07.706801 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Oct 2 19:05:07.706840 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Oct 2 19:05:07.706880 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Oct 2 19:05:07.706924 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Oct 2 19:05:07.706965 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Oct 2 19:05:07.707005 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Oct 2 19:05:07.707051 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Oct 2 19:05:07.707091 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Oct 2 19:05:07.707131 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Oct 2 19:05:07.707175 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Oct 2 19:05:07.707380 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Oct 2 19:05:07.707426 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Oct 2 19:05:07.707471 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Oct 2 19:05:07.707527 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Oct 2 19:05:07.707573 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Oct 2 19:05:07.707821 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Oct 2 19:05:07.707872 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Oct 2 19:05:07.707923 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Oct 2 19:05:07.707996 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Oct 2 19:05:07.708255 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Oct 2 19:05:07.708584 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Oct 2 19:05:07.708640 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Oct 2 19:05:07.708902 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Oct 2 19:05:07.708951 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Oct 2 19:05:07.709001 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Oct 2 19:05:07.709050 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Oct 2 19:05:07.709097 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Oct 2 19:05:07.709139 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Oct 2 19:05:07.709186 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Oct 2 19:05:07.709228 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Oct 2 19:05:07.709269 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Oct 2 19:05:07.709314 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Oct 2 19:05:07.709356 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Oct 2 19:05:07.709400 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Oct 2 19:05:07.709442 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Oct 2 19:05:07.709486 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Oct 2 19:05:07.709786 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Oct 2 19:05:07.709836 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Oct 2 19:05:07.709882 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Oct 2 19:05:07.709928 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Oct 2 19:05:07.709975 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Oct 2 19:05:07.710021 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Oct 2 19:05:07.710063 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Oct 2 19:05:07.710103 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Oct 2 19:05:07.710149 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Oct 2 19:05:07.710190 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Oct 2 19:05:07.710231 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Oct 2 19:05:07.710298 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Oct 2 19:05:07.710570 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Oct 2 19:05:07.710622 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Oct 2 19:05:07.710675 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Oct 2 19:05:07.710734 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Oct 2 19:05:07.710789 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Oct 2 19:05:07.711070 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Oct 2 19:05:07.711121 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Oct 2 19:05:07.711165 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Oct 2 19:05:07.711215 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Oct 2 19:05:07.711261 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Oct 2 19:05:07.711320 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Oct 2 19:05:07.711363 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Oct 2 19:05:07.711408 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Oct 2 19:05:07.711450 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Oct 2 19:05:07.711491 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Oct 2 19:05:07.711782 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Oct 2 19:05:07.711828 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Oct 2 19:05:07.711869 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Oct 2 19:05:07.711913 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Oct 2 19:05:07.711955 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Oct 2 19:05:07.711998 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Oct 2 19:05:07.712042 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Oct 2 19:05:07.712086 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Oct 2 19:05:07.712126 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Oct 2 19:05:07.712172 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Oct 2 19:05:07.712213 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Oct 2 19:05:07.712257 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Oct 2 19:05:07.712301 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Oct 2 19:05:07.712345 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Oct 2 19:05:07.712386 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Oct 2 19:05:07.712435 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:05:07.712444 kernel: PCI: CLS 32 bytes, default 64 Oct 2 19:05:07.712451 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:05:07.712458 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Oct 2 19:05:07.712465 kernel: clocksource: Switched to clocksource tsc Oct 2 19:05:07.716410 kernel: Initialise system trusted keyrings Oct 2 19:05:07.716417 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:05:07.716424 kernel: Key type asymmetric registered Oct 2 19:05:07.716430 kernel: Asymmetric key parser 'x509' registered Oct 2 19:05:07.716436 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:05:07.716442 kernel: io scheduler mq-deadline registered Oct 2 19:05:07.716448 kernel: io scheduler kyber registered Oct 2 19:05:07.716454 kernel: io scheduler bfq registered Oct 2 19:05:07.716545 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Oct 2 19:05:07.716602 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.716650 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Oct 2 19:05:07.716697 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.716743 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Oct 2 19:05:07.716788 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.716834 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Oct 2 19:05:07.716880 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.716928 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Oct 2 19:05:07.716974 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717020 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Oct 2 19:05:07.717065 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717110 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Oct 2 19:05:07.717158 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717204 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Oct 2 19:05:07.717249 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717300 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Oct 2 19:05:07.717348 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717393 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Oct 2 19:05:07.717440 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717485 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Oct 2 19:05:07.717537 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717584 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Oct 2 19:05:07.717629 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717675 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Oct 2 19:05:07.717723 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717768 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Oct 2 19:05:07.717813 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717859 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Oct 2 19:05:07.717905 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.717953 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Oct 2 19:05:07.718011 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718070 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Oct 2 19:05:07.718116 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718162 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Oct 2 19:05:07.718207 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718252 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Oct 2 19:05:07.718301 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718347 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Oct 2 19:05:07.718393 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718438 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Oct 2 19:05:07.718484 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718537 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Oct 2 19:05:07.718584 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718630 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Oct 2 19:05:07.718675 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718721 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Oct 2 19:05:07.718770 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718817 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Oct 2 19:05:07.718862 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.718907 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Oct 2 19:05:07.718951 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.719008 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Oct 2 19:05:07.719056 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.719104 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Oct 2 19:05:07.719149 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.719194 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Oct 2 19:05:07.719239 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.719284 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Oct 2 19:05:07.719328 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.719377 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Oct 2 19:05:07.719424 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.719470 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Oct 2 19:05:07.719713 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Oct 2 19:05:07.719724 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:05:07.719734 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:05:07.719740 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:05:07.719746 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Oct 2 19:05:07.719752 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:05:07.719758 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:05:07.719809 kernel: rtc_cmos 00:01: registered as rtc0 Oct 2 19:05:07.719876 kernel: rtc_cmos 00:01: setting system clock to 2023-10-02T19:05:07 UTC (1696273507) Oct 2 19:05:07.719886 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:05:07.719929 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Oct 2 19:05:07.719937 kernel: fail to initialize ptp_kvm Oct 2 19:05:07.719943 kernel: intel_pstate: CPU model not supported Oct 2 19:05:07.719950 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:05:07.719956 kernel: Segment Routing with IPv6 Oct 2 19:05:07.719962 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:05:07.719968 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:05:07.719974 kernel: Key type dns_resolver registered Oct 2 19:05:07.719980 kernel: IPI shorthand broadcast: enabled Oct 2 19:05:07.719988 kernel: sched_clock: Marking stable (886189872, 225110910)->(1179523719, -68222937) Oct 2 19:05:07.719994 kernel: registered taskstats version 1 Oct 2 19:05:07.720000 kernel: Loading compiled-in X.509 certificates Oct 2 19:05:07.720006 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:05:07.720012 kernel: Key type .fscrypt registered Oct 2 19:05:07.720018 kernel: Key type fscrypt-provisioning registered Oct 2 19:05:07.720024 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:05:07.720030 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:05:07.720305 kernel: ima: No architecture policies found Oct 2 19:05:07.720314 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:05:07.720320 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:05:07.720326 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:05:07.720333 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:05:07.720339 kernel: Run /init as init process Oct 2 19:05:07.720345 kernel: with arguments: Oct 2 19:05:07.720351 kernel: /init Oct 2 19:05:07.720357 kernel: with environment: Oct 2 19:05:07.720363 kernel: HOME=/ Oct 2 19:05:07.720370 kernel: TERM=linux Oct 2 19:05:07.720376 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:05:07.720383 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:05:07.720391 systemd[1]: Detected virtualization vmware. Oct 2 19:05:07.720398 systemd[1]: Detected architecture x86-64. Oct 2 19:05:07.720404 systemd[1]: Running in initrd. Oct 2 19:05:07.720410 systemd[1]: No hostname configured, using default hostname. Oct 2 19:05:07.720416 systemd[1]: Hostname set to . Oct 2 19:05:07.720429 systemd[1]: Initializing machine ID from random generator. Oct 2 19:05:07.720436 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:05:07.720442 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:05:07.720448 systemd[1]: Reached target cryptsetup.target. Oct 2 19:05:07.720454 systemd[1]: Reached target paths.target. Oct 2 19:05:07.720460 systemd[1]: Reached target slices.target. Oct 2 19:05:07.720467 systemd[1]: Reached target swap.target. Oct 2 19:05:07.720473 systemd[1]: Reached target timers.target. Oct 2 19:05:07.720480 systemd[1]: Listening on iscsid.socket. Oct 2 19:05:07.720487 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:05:07.720493 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:05:07.720613 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:05:07.720622 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:05:07.720628 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:05:07.720635 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:05:07.720641 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:05:07.720649 systemd[1]: Reached target sockets.target. Oct 2 19:05:07.720656 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:05:07.720662 systemd[1]: Finished network-cleanup.service. Oct 2 19:05:07.720669 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:05:07.720675 systemd[1]: Starting systemd-journald.service... Oct 2 19:05:07.720681 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:05:07.720688 systemd[1]: Starting systemd-resolved.service... Oct 2 19:05:07.720694 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:05:07.720700 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:05:07.720707 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:05:07.720713 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:05:07.720720 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:05:07.720726 kernel: audit: type=1130 audit(1696273507.659:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.720733 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:05:07.720739 kernel: audit: type=1130 audit(1696273507.670:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.720746 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:05:07.720752 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:05:07.720759 kernel: Bridge firewalling registered Oct 2 19:05:07.720765 systemd[1]: Started systemd-resolved.service. Oct 2 19:05:07.720772 kernel: audit: type=1130 audit(1696273507.688:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.720778 systemd[1]: Reached target nss-lookup.target. Oct 2 19:05:07.720784 kernel: SCSI subsystem initialized Oct 2 19:05:07.720790 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:05:07.720796 kernel: audit: type=1130 audit(1696273507.694:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.720802 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:05:07.720810 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:05:07.720816 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:05:07.720822 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:05:07.720828 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:05:07.720835 kernel: audit: type=1130 audit(1696273507.710:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.720842 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:05:07.720851 systemd-journald[216]: Journal started Oct 2 19:05:07.721151 systemd-journald[216]: Runtime Journal (/run/log/journal/e008f4d77b314353ad55488bc2565ebf) is 4.8M, max 38.8M, 34.0M free. Oct 2 19:05:07.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.650527 systemd-modules-load[217]: Inserted module 'overlay' Oct 2 19:05:07.679690 systemd-resolved[218]: Positive Trust Anchors: Oct 2 19:05:07.679691 systemd-modules-load[217]: Inserted module 'br_netfilter' Oct 2 19:05:07.679695 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:05:07.679715 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:05:07.683329 systemd-resolved[218]: Defaulting to hostname 'linux'. Oct 2 19:05:07.723746 systemd[1]: Started systemd-journald.service. Oct 2 19:05:07.711300 systemd-modules-load[217]: Inserted module 'dm_multipath' Oct 2 19:05:07.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.724165 dracut-cmdline[233]: dracut-dracut-053 Oct 2 19:05:07.724165 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 2 19:05:07.724165 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:05:07.729233 kernel: audit: type=1130 audit(1696273507.722:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.729245 kernel: audit: type=1130 audit(1696273507.725:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.724258 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:05:07.750513 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:05:07.758512 kernel: iscsi: registered transport (tcp) Oct 2 19:05:07.771511 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:05:07.771537 kernel: QLogic iSCSI HBA Driver Oct 2 19:05:07.790637 kernel: audit: type=1130 audit(1696273507.786:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:07.787726 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:05:07.788320 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:05:07.825521 kernel: raid6: avx2x4 gen() 47780 MB/s Oct 2 19:05:07.842522 kernel: raid6: avx2x4 xor() 20474 MB/s Oct 2 19:05:07.859516 kernel: raid6: avx2x2 gen() 53348 MB/s Oct 2 19:05:07.876517 kernel: raid6: avx2x2 xor() 31863 MB/s Oct 2 19:05:07.893527 kernel: raid6: avx2x1 gen() 44373 MB/s Oct 2 19:05:07.910519 kernel: raid6: avx2x1 xor() 27640 MB/s Oct 2 19:05:07.927542 kernel: raid6: sse2x4 gen() 20976 MB/s Oct 2 19:05:07.944515 kernel: raid6: sse2x4 xor() 11698 MB/s Oct 2 19:05:07.961532 kernel: raid6: sse2x2 gen() 21347 MB/s Oct 2 19:05:07.978527 kernel: raid6: sse2x2 xor() 12514 MB/s Oct 2 19:05:07.995516 kernel: raid6: sse2x1 gen() 16822 MB/s Oct 2 19:05:08.012715 kernel: raid6: sse2x1 xor() 8871 MB/s Oct 2 19:05:08.012750 kernel: raid6: using algorithm avx2x2 gen() 53348 MB/s Oct 2 19:05:08.012758 kernel: raid6: .... xor() 31863 MB/s, rmw enabled Oct 2 19:05:08.013893 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:05:08.022514 kernel: xor: automatically using best checksumming function avx Oct 2 19:05:08.081551 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:05:08.085863 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:05:08.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:08.086528 systemd[1]: Starting systemd-udevd.service... Oct 2 19:05:08.084000 audit: BPF prog-id=7 op=LOAD Oct 2 19:05:08.084000 audit: BPF prog-id=8 op=LOAD Oct 2 19:05:08.093524 kernel: audit: type=1130 audit(1696273508.084:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:08.097030 systemd-udevd[416]: Using default interface naming scheme 'v252'. Oct 2 19:05:08.099713 systemd[1]: Started systemd-udevd.service. Oct 2 19:05:08.100295 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:05:08.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:08.108441 dracut-pre-trigger[421]: rd.md=0: removing MD RAID activation Oct 2 19:05:08.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:08.125138 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:05:08.125741 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:05:08.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:08.188723 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:05:08.237511 kernel: VMware PVSCSI driver - version 1.0.7.0-k Oct 2 19:05:08.251519 kernel: vmw_pvscsi: using 64bit dma Oct 2 19:05:08.263323 kernel: vmw_pvscsi: max_id: 16 Oct 2 19:05:08.263356 kernel: vmw_pvscsi: setting ring_pages to 8 Oct 2 19:05:08.264511 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:05:08.264536 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Oct 2 19:05:08.270513 kernel: libata version 3.00 loaded. Oct 2 19:05:08.270546 kernel: vmw_pvscsi: enabling reqCallThreshold Oct 2 19:05:08.271526 kernel: vmw_pvscsi: driver-based request coalescing enabled Oct 2 19:05:08.271546 kernel: vmw_pvscsi: using MSI-X Oct 2 19:05:08.272512 kernel: ata_piix 0000:00:07.1: version 2.13 Oct 2 19:05:08.275522 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Oct 2 19:05:08.277080 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:05:08.277108 kernel: AES CTR mode by8 optimization enabled Oct 2 19:05:08.277512 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Oct 2 19:05:08.279129 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Oct 2 19:05:08.279247 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Oct 2 19:05:08.284519 kernel: scsi host1: ata_piix Oct 2 19:05:08.284655 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Oct 2 19:05:08.286513 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Oct 2 19:05:08.287511 kernel: scsi host2: ata_piix Oct 2 19:05:08.287610 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Oct 2 19:05:08.287619 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Oct 2 19:05:08.455555 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Oct 2 19:05:08.459519 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Oct 2 19:05:08.464983 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Oct 2 19:05:08.465077 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 19:05:08.465137 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Oct 2 19:05:08.465194 kernel: sd 0:0:0:0: [sda] Cache data unavailable Oct 2 19:05:08.465248 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Oct 2 19:05:08.469512 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:05:08.469531 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 19:05:08.492513 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Oct 2 19:05:08.492644 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:05:08.495288 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:05:08.496578 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (475) Oct 2 19:05:08.498483 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:05:08.500172 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:05:08.500422 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:05:08.504016 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:05:08.504697 systemd[1]: Starting disk-uuid.service... Oct 2 19:05:08.507518 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Oct 2 19:05:08.528514 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:05:08.533513 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:05:09.537259 disk-uuid[539]: The operation has completed successfully. Oct 2 19:05:09.537516 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:05:09.571383 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:05:09.571678 systemd[1]: Finished disk-uuid.service. Oct 2 19:05:09.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.574244 systemd[1]: Starting verity-setup.service... Oct 2 19:05:09.584521 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:05:09.631103 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:05:09.632226 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:05:09.633195 systemd[1]: Finished verity-setup.service. Oct 2 19:05:09.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.687540 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:05:09.687208 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:05:09.687981 systemd[1]: Starting afterburn-network-kargs.service... Oct 2 19:05:09.688616 systemd[1]: Starting ignition-setup.service... Oct 2 19:05:09.706602 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:05:09.706632 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:05:09.706644 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:05:09.714511 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:05:09.723229 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:05:09.728896 systemd[1]: Finished ignition-setup.service. Oct 2 19:05:09.729514 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:05:09.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.778925 systemd[1]: Finished afterburn-network-kargs.service. Oct 2 19:05:09.779568 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:05:09.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.824724 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:05:09.825606 systemd[1]: Starting systemd-networkd.service... Oct 2 19:05:09.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.823000 audit: BPF prog-id=9 op=LOAD Oct 2 19:05:09.841837 systemd-networkd[725]: lo: Link UP Oct 2 19:05:09.841843 systemd-networkd[725]: lo: Gained carrier Oct 2 19:05:09.842103 systemd-networkd[725]: Enumeration completed Oct 2 19:05:09.845900 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 2 19:05:09.846008 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 2 19:05:09.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.842272 systemd[1]: Started systemd-networkd.service. Oct 2 19:05:09.842304 systemd-networkd[725]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Oct 2 19:05:09.842403 systemd[1]: Reached target network.target. Oct 2 19:05:09.842875 systemd[1]: Starting iscsiuio.service... Oct 2 19:05:09.846032 systemd-networkd[725]: ens192: Link UP Oct 2 19:05:09.846034 systemd-networkd[725]: ens192: Gained carrier Oct 2 19:05:09.848333 systemd[1]: Started iscsiuio.service. Oct 2 19:05:09.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.848913 systemd[1]: Starting iscsid.service... Oct 2 19:05:09.851091 iscsid[730]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:05:09.851091 iscsid[730]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:05:09.851091 iscsid[730]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:05:09.851091 iscsid[730]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:05:09.851091 iscsid[730]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:05:09.852113 iscsid[730]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:05:09.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.852418 systemd[1]: Started iscsid.service. Oct 2 19:05:09.853018 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:05:09.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.859245 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:05:09.859389 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:05:09.859476 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:05:09.859707 systemd[1]: Reached target remote-fs.target. Oct 2 19:05:09.861211 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:05:09.866488 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:05:09.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.877235 ignition[597]: Ignition 2.14.0 Oct 2 19:05:09.877242 ignition[597]: Stage: fetch-offline Oct 2 19:05:09.877272 ignition[597]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:05:09.877285 ignition[597]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:05:09.880187 ignition[597]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:05:09.880256 ignition[597]: parsed url from cmdline: "" Oct 2 19:05:09.880258 ignition[597]: no config URL provided Oct 2 19:05:09.880261 ignition[597]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:05:09.880266 ignition[597]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:05:09.886202 ignition[597]: config successfully fetched Oct 2 19:05:09.886277 ignition[597]: parsing config with SHA512: ca4e9b8da8d00e66705e7ed52349170e8b70b94d221e95aa836d0564310e475e5fd5607ff65b62fb4c16c08683f4626bf65f7229c3bf4f42e402b430a358a64e Oct 2 19:05:09.900921 systemd-resolved[218]: Detected conflict on linux IN A 139.178.70.107 Oct 2 19:05:09.900932 systemd-resolved[218]: Hostname conflict, changing published hostname from 'linux' to 'linux2'. Oct 2 19:05:09.906763 unknown[597]: fetched base config from "system" Oct 2 19:05:09.906925 unknown[597]: fetched user config from "vmware" Oct 2 19:05:09.907391 ignition[597]: fetch-offline: fetch-offline passed Oct 2 19:05:09.907566 ignition[597]: Ignition finished successfully Oct 2 19:05:09.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.908274 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:05:09.908415 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 19:05:09.908855 systemd[1]: Starting ignition-kargs.service... Oct 2 19:05:09.913765 ignition[745]: Ignition 2.14.0 Oct 2 19:05:09.913948 ignition[745]: Stage: kargs Oct 2 19:05:09.914112 ignition[745]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:05:09.914262 ignition[745]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:05:09.915531 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:05:09.917041 ignition[745]: kargs: kargs passed Oct 2 19:05:09.917078 ignition[745]: Ignition finished successfully Oct 2 19:05:09.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.917933 systemd[1]: Finished ignition-kargs.service. Oct 2 19:05:09.918481 systemd[1]: Starting ignition-disks.service... Oct 2 19:05:09.923515 ignition[751]: Ignition 2.14.0 Oct 2 19:05:09.923523 ignition[751]: Stage: disks Oct 2 19:05:09.923581 ignition[751]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:05:09.923591 ignition[751]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:05:09.924648 ignition[751]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:05:09.925554 ignition[751]: disks: disks passed Oct 2 19:05:09.925582 ignition[751]: Ignition finished successfully Oct 2 19:05:09.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.926164 systemd[1]: Finished ignition-disks.service. Oct 2 19:05:09.926308 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:05:09.926398 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:05:09.926481 systemd[1]: Reached target local-fs.target. Oct 2 19:05:09.926567 systemd[1]: Reached target sysinit.target. Oct 2 19:05:09.926727 systemd[1]: Reached target basic.target. Oct 2 19:05:09.927330 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:05:09.937873 systemd-fsck[759]: ROOT: clean, 603/1628000 files, 124049/1617920 blocks Oct 2 19:05:09.939368 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:05:09.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.939881 systemd[1]: Mounting sysroot.mount... Oct 2 19:05:09.948189 systemd[1]: Mounted sysroot.mount. Oct 2 19:05:09.948464 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:05:09.948633 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:05:09.949537 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:05:09.950122 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:05:09.950350 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:05:09.950587 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:05:09.951446 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:05:09.952143 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:05:09.955045 initrd-setup-root[769]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:05:09.958547 initrd-setup-root[777]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:05:09.960730 initrd-setup-root[785]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:05:09.962827 initrd-setup-root[793]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:05:09.990396 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:05:09.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:09.990975 systemd[1]: Starting ignition-mount.service... Oct 2 19:05:09.991435 systemd[1]: Starting sysroot-boot.service... Oct 2 19:05:09.995322 bash[810]: umount: /sysroot/usr/share/oem: not mounted. Oct 2 19:05:10.000316 ignition[811]: INFO : Ignition 2.14.0 Oct 2 19:05:10.000538 ignition[811]: INFO : Stage: mount Oct 2 19:05:10.000710 ignition[811]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:05:10.000862 ignition[811]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:05:10.002377 ignition[811]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:05:10.003977 ignition[811]: INFO : mount: mount passed Oct 2 19:05:10.004113 ignition[811]: INFO : Ignition finished successfully Oct 2 19:05:10.004646 systemd[1]: Finished ignition-mount.service. Oct 2 19:05:10.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:10.009719 systemd[1]: Finished sysroot-boot.service. Oct 2 19:05:10.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:10.647190 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:05:10.656518 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (820) Oct 2 19:05:10.660004 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:05:10.660023 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:05:10.660031 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:05:10.666518 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:05:10.667918 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:05:10.668617 systemd[1]: Starting ignition-files.service... Oct 2 19:05:10.678159 ignition[840]: INFO : Ignition 2.14.0 Oct 2 19:05:10.678159 ignition[840]: INFO : Stage: files Oct 2 19:05:10.678553 ignition[840]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:05:10.678553 ignition[840]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:05:10.679712 ignition[840]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:05:10.682547 ignition[840]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:05:10.683560 ignition[840]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:05:10.683560 ignition[840]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:05:10.686110 ignition[840]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:05:10.686331 ignition[840]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:05:10.687045 unknown[840]: wrote ssh authorized keys file for user: core Oct 2 19:05:10.687253 ignition[840]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:05:10.687610 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:05:10.687788 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:05:10.865817 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:05:10.972362 ignition[840]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:05:10.972680 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:05:10.972680 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:05:10.972680 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:05:11.346095 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:05:11.739801 systemd-networkd[725]: ens192: Gained IPv6LL Oct 2 19:05:13.234771 ignition[840]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:05:13.235227 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:05:13.235227 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:05:13.235227 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:05:13.443907 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:05:14.842100 ignition[840]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Oct 2 19:05:14.842520 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:05:14.842520 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:05:14.842520 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:05:14.920392 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:05:16.992270 ignition[840]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Oct 2 19:05:16.992753 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:05:16.992954 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:05:16.993163 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:05:17.170762 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:05:18.151533 ignition[840]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 2 19:05:18.152307 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:05:18.157522 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1218983322" Oct 2 19:05:18.160658 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (845) Oct 2 19:05:18.160677 ignition[840]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1218983322": device or resource busy Oct 2 19:05:18.160677 ignition[840]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1218983322", trying btrfs: device or resource busy Oct 2 19:05:18.160677 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1218983322" Oct 2 19:05:18.160677 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1218983322" Oct 2 19:05:18.160677 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem1218983322" Oct 2 19:05:18.160677 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem1218983322" Oct 2 19:05:18.160677 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Oct 2 19:05:18.160677 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 2 19:05:18.160677 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Oct 2 19:05:18.160677 ignition[840]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Oct 2 19:05:18.160677 ignition[840]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Oct 2 19:05:18.160677 ignition[840]: INFO : files: op(11): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:05:18.160677 ignition[840]: INFO : files: op(11): op(12): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:05:18.160677 ignition[840]: INFO : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:05:18.160677 ignition[840]: INFO : files: op(11): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:05:18.160677 ignition[840]: INFO : files: op(13): [started] processing unit "prepare-critools.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(13): op(14): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(13): [finished] processing unit "prepare-critools.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(17): [started] setting preset to enabled for "vmtoolsd.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(17): [finished] setting preset to enabled for "vmtoolsd.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(18): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(19): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Oct 2 19:05:18.163829 ignition[840]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:05:18.218034 ignition[840]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:05:18.218331 ignition[840]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Oct 2 19:05:18.218331 ignition[840]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:05:18.218331 ignition[840]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:05:18.218331 ignition[840]: INFO : files: files passed Oct 2 19:05:18.218331 ignition[840]: INFO : Ignition finished successfully Oct 2 19:05:18.224901 kernel: kauditd_printk_skb: 24 callbacks suppressed Oct 2 19:05:18.224916 kernel: audit: type=1130 audit(1696273518.217:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.219002 systemd[1]: Finished ignition-files.service. Oct 2 19:05:18.220595 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:05:18.224412 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:05:18.225073 systemd[1]: Starting ignition-quench.service... Oct 2 19:05:18.226702 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:05:18.226748 systemd[1]: Finished ignition-quench.service. Oct 2 19:05:18.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.231901 kernel: audit: type=1130 audit(1696273518.225:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.231916 kernel: audit: type=1131 audit(1696273518.225:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.232842 initrd-setup-root-after-ignition[867]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:05:18.233340 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:05:18.233492 systemd[1]: Reached target ignition-complete.target. Oct 2 19:05:18.236224 kernel: audit: type=1130 audit(1696273518.231:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.236483 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:05:18.243994 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:05:18.244042 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:05:18.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.244425 systemd[1]: Reached target initrd-fs.target. Oct 2 19:05:18.249610 kernel: audit: type=1130 audit(1696273518.242:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.249623 kernel: audit: type=1131 audit(1696273518.242:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.249179 systemd[1]: Reached target initrd.target. Oct 2 19:05:18.249287 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:05:18.250104 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:05:18.256356 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:05:18.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.257005 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:05:18.259543 kernel: audit: type=1130 audit(1696273518.255:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.262679 systemd[1]: Stopped target network.target. Oct 2 19:05:18.262821 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:05:18.262983 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:05:18.263159 systemd[1]: Stopped target timers.target. Oct 2 19:05:18.263320 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:05:18.263373 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:05:18.263656 systemd[1]: Stopped target initrd.target. Oct 2 19:05:18.266250 kernel: audit: type=1131 audit(1696273518.262:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.266173 systemd[1]: Stopped target basic.target. Oct 2 19:05:18.266340 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:05:18.266538 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:05:18.266710 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:05:18.266887 systemd[1]: Stopped target remote-fs.target. Oct 2 19:05:18.267059 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:05:18.267235 systemd[1]: Stopped target sysinit.target. Oct 2 19:05:18.267418 systemd[1]: Stopped target local-fs.target. Oct 2 19:05:18.267620 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:05:18.267782 systemd[1]: Stopped target swap.target. Oct 2 19:05:18.267933 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:05:18.270463 kernel: audit: type=1131 audit(1696273518.266:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.267988 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:05:18.268155 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:05:18.270552 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:05:18.270606 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:05:18.273383 kernel: audit: type=1131 audit(1696273518.269:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.270793 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:05:18.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.270854 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:05:18.273354 systemd[1]: Stopped target paths.target. Oct 2 19:05:18.273459 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:05:18.278607 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:05:18.278795 systemd[1]: Stopped target slices.target. Oct 2 19:05:18.278979 systemd[1]: Stopped target sockets.target. Oct 2 19:05:18.279186 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:05:18.279226 systemd[1]: Closed iscsid.socket. Oct 2 19:05:18.279352 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:05:18.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.279395 systemd[1]: Closed iscsiuio.socket. Oct 2 19:05:18.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.279563 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:05:18.279620 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:05:18.279781 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:05:18.279834 systemd[1]: Stopped ignition-files.service. Oct 2 19:05:18.280344 systemd[1]: Stopping ignition-mount.service... Oct 2 19:05:18.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.280480 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:05:18.280550 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:05:18.281088 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:05:18.285975 ignition[880]: INFO : Ignition 2.14.0 Oct 2 19:05:18.285975 ignition[880]: INFO : Stage: umount Oct 2 19:05:18.285975 ignition[880]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:05:18.285975 ignition[880]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Oct 2 19:05:18.287296 ignition[880]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Oct 2 19:05:18.287544 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:05:18.288142 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:05:18.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.288229 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:05:18.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.288297 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:05:18.288762 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:05:18.288829 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:05:18.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.294241 ignition[880]: INFO : umount: umount passed Oct 2 19:05:18.294241 ignition[880]: INFO : Ignition finished successfully Oct 2 19:05:18.291274 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:05:18.292597 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:05:18.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.292650 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:05:18.292838 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:05:18.292896 systemd[1]: Stopped ignition-mount.service. Oct 2 19:05:18.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.293032 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:05:18.293074 systemd[1]: Stopped ignition-disks.service. Oct 2 19:05:18.293179 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:05:18.293199 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:05:18.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.293300 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:05:18.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.293317 systemd[1]: Stopped ignition-setup.service. Oct 2 19:05:18.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.293539 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:05:18.293591 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:05:18.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.295000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:05:18.295000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:05:18.294013 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:05:18.294064 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:05:18.294474 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:05:18.294546 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:05:18.294829 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:05:18.294849 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:05:18.295020 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:05:18.295040 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:05:18.295590 systemd[1]: Stopping network-cleanup.service... Oct 2 19:05:18.295696 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:05:18.295726 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:05:18.295898 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Oct 2 19:05:18.295918 systemd[1]: Stopped afterburn-network-kargs.service. Oct 2 19:05:18.296037 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:05:18.296055 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:05:18.296293 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:05:18.296312 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:05:18.296687 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:05:18.297452 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:05:18.300270 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:05:18.300325 systemd[1]: Stopped network-cleanup.service. Oct 2 19:05:18.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.301205 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:05:18.301273 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:05:18.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.301651 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:05:18.301674 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:05:18.301885 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:05:18.301902 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:05:18.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.302037 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:05:18.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.302057 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:05:18.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.302229 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:05:18.302247 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:05:18.302385 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:05:18.302403 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:05:18.302941 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:05:18.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.303101 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:05:18.303127 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:05:18.306436 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:05:18.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.306481 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:05:18.306627 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:05:18.307217 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:05:18.313455 systemd[1]: Switching root. Oct 2 19:05:18.323615 iscsid[730]: iscsid shutting down. Oct 2 19:05:18.323779 systemd-journald[216]: Journal stopped Oct 2 19:05:20.358707 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Oct 2 19:05:20.358776 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:05:20.358789 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:05:20.358796 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:05:20.358801 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:05:20.358808 kernel: SELinux: policy capability open_perms=1 Oct 2 19:05:20.358815 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:05:20.358820 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:05:20.358826 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:05:20.358831 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:05:20.358836 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:05:20.358841 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:05:20.358848 systemd[1]: Successfully loaded SELinux policy in 36.924ms. Oct 2 19:05:20.358856 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.461ms. Oct 2 19:05:20.358863 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:05:20.358870 systemd[1]: Detected virtualization vmware. Oct 2 19:05:20.358885 systemd[1]: Detected architecture x86-64. Oct 2 19:05:20.358891 systemd[1]: Detected first boot. Oct 2 19:05:20.358898 systemd[1]: Initializing machine ID from random generator. Oct 2 19:05:20.358904 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:05:20.369554 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:05:20.369577 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:05:20.369585 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:05:20.369595 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:05:20.369601 systemd[1]: Stopped iscsiuio.service. Oct 2 19:05:20.369607 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:05:20.369614 systemd[1]: Stopped iscsid.service. Oct 2 19:05:20.369620 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:05:20.369627 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:05:20.369651 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:05:20.369657 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:05:20.369665 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:05:20.369672 systemd[1]: Created slice system-getty.slice. Oct 2 19:05:20.369678 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:05:20.369684 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:05:20.369691 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:05:20.369697 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:05:20.369703 systemd[1]: Created slice user.slice. Oct 2 19:05:20.369710 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:05:20.369716 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:05:20.369725 systemd[1]: Set up automount boot.automount. Oct 2 19:05:20.369733 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:05:20.369740 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:05:20.369746 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:05:20.369752 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:05:20.369759 systemd[1]: Reached target integritysetup.target. Oct 2 19:05:20.369765 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:05:20.369772 systemd[1]: Reached target remote-fs.target. Oct 2 19:05:20.369780 systemd[1]: Reached target slices.target. Oct 2 19:05:20.369786 systemd[1]: Reached target swap.target. Oct 2 19:05:20.369793 systemd[1]: Reached target torcx.target. Oct 2 19:05:20.369799 systemd[1]: Reached target veritysetup.target. Oct 2 19:05:20.369806 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:05:20.369814 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:05:20.369821 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:05:20.369828 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:05:20.369835 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:05:20.369841 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:05:20.369848 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:05:20.369855 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:05:20.369861 systemd[1]: Mounting media.mount... Oct 2 19:05:20.369869 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:05:20.369876 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:05:20.369883 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:05:20.369890 systemd[1]: Mounting tmp.mount... Oct 2 19:05:20.369896 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:05:20.369903 systemd[1]: Starting ignition-delete-config.service... Oct 2 19:05:20.369909 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:05:20.369916 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:05:20.369923 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:05:20.369930 systemd[1]: Starting modprobe@drm.service... Oct 2 19:05:20.369937 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:05:20.369944 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:05:20.369951 systemd[1]: Starting modprobe@loop.service... Oct 2 19:05:20.369958 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:05:20.369964 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:05:20.369971 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:05:20.369978 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:05:20.369984 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:05:20.369992 systemd[1]: Stopped systemd-journald.service. Oct 2 19:05:20.369998 systemd[1]: Starting systemd-journald.service... Oct 2 19:05:20.370005 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:05:20.370012 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:05:20.370018 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:05:20.370025 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:05:20.370032 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:05:20.370038 systemd[1]: Stopped verity-setup.service. Oct 2 19:05:20.370045 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:05:20.370053 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:05:20.370060 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:05:20.370132 systemd[1]: Mounted media.mount. Oct 2 19:05:20.370142 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:05:20.370150 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:05:20.370157 systemd[1]: Mounted tmp.mount. Oct 2 19:05:20.370164 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:05:20.370171 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:05:20.370177 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:05:20.370186 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:05:20.370193 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:05:20.370199 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:05:20.370209 systemd-journald[993]: Journal started Oct 2 19:05:20.370244 systemd-journald[993]: Runtime Journal (/run/log/journal/60f6d4e55d7b48a7af064c83efd61738) is 4.8M, max 38.8M, 34.0M free. Oct 2 19:05:18.400000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:05:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:05:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:05:18.441000 audit: BPF prog-id=10 op=LOAD Oct 2 19:05:18.441000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:05:18.441000 audit: BPF prog-id=11 op=LOAD Oct 2 19:05:18.441000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:05:20.257000 audit: BPF prog-id=12 op=LOAD Oct 2 19:05:20.257000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:05:20.257000 audit: BPF prog-id=13 op=LOAD Oct 2 19:05:20.257000 audit: BPF prog-id=14 op=LOAD Oct 2 19:05:20.257000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:05:20.257000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:05:20.258000 audit: BPF prog-id=15 op=LOAD Oct 2 19:05:20.258000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:05:20.258000 audit: BPF prog-id=16 op=LOAD Oct 2 19:05:20.258000 audit: BPF prog-id=17 op=LOAD Oct 2 19:05:20.258000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:05:20.258000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:05:20.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.260000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:05:20.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.326000 audit: BPF prog-id=18 op=LOAD Oct 2 19:05:20.326000 audit: BPF prog-id=19 op=LOAD Oct 2 19:05:20.326000 audit: BPF prog-id=20 op=LOAD Oct 2 19:05:20.326000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:05:20.326000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:05:20.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.349000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:05:20.349000 audit[993]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe95c0c540 a2=4000 a3=7ffe95c0c5dc items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:20.349000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:05:20.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.256897 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:05:20.383212 systemd[1]: Finished modprobe@drm.service. Oct 2 19:05:20.383227 systemd[1]: Started systemd-journald.service. Oct 2 19:05:20.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:18.583644 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:05:20.260438 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:05:18.584140 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:05:20.380345 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:05:18.584155 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:05:20.380417 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:05:18.584179 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:05:20.380660 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:05:18.584187 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:05:18.584209 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:05:18.584218 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:05:18.584367 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:05:20.383940 jq[980]: true Oct 2 19:05:18.584397 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:05:18.584407 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:05:18.584970 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:05:18.584999 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:05:18.585014 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:05:18.585024 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:05:18.585036 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:05:18.585046 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:05:20.031065 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:05:20.031218 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:05:20.031280 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:05:20.031376 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:05:20.384622 jq[998]: true Oct 2 19:05:20.031407 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:05:20.031447 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2023-10-02T19:05:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:05:20.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.386843 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:05:20.388213 systemd[1]: Reached target network-pre.target. Oct 2 19:05:20.388538 kernel: fuse: init (API version 7.34) Oct 2 19:05:20.389078 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:05:20.389186 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:05:20.391914 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:05:20.392949 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:05:20.393078 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:05:20.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.405354 systemd-journald[993]: Time spent on flushing to /var/log/journal/60f6d4e55d7b48a7af064c83efd61738 is 95.694ms for 1998 entries. Oct 2 19:05:20.405354 systemd-journald[993]: System Journal (/var/log/journal/60f6d4e55d7b48a7af064c83efd61738) is 8.0M, max 584.8M, 576.8M free. Oct 2 19:05:20.512339 systemd-journald[993]: Received client request to flush runtime journal. Oct 2 19:05:20.512397 kernel: loop: module loaded Oct 2 19:05:20.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.393738 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:05:20.394526 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:05:20.394602 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:05:20.394783 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:05:20.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.395633 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:05:20.513657 udevadm[1042]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:05:20.396546 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:05:20.397376 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:05:20.398088 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:05:20.405070 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:05:20.405214 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:05:20.423180 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:05:20.453750 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:05:20.454705 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:05:20.458410 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:05:20.458512 systemd[1]: Finished modprobe@loop.service. Oct 2 19:05:20.458701 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:05:20.493013 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:05:20.493995 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:05:20.512861 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:05:20.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.527532 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:05:20.590148 ignition[1012]: Ignition 2.14.0 Oct 2 19:05:20.590604 ignition[1012]: deleting config from guestinfo properties Oct 2 19:05:20.593836 ignition[1012]: Successfully deleted config Oct 2 19:05:20.594459 systemd[1]: Finished ignition-delete-config.service. Oct 2 19:05:20.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.871722 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:05:20.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.871000 audit: BPF prog-id=21 op=LOAD Oct 2 19:05:20.871000 audit: BPF prog-id=22 op=LOAD Oct 2 19:05:20.871000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:05:20.871000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:05:20.873037 systemd[1]: Starting systemd-udevd.service... Oct 2 19:05:20.885189 systemd-udevd[1044]: Using default interface naming scheme 'v252'. Oct 2 19:05:20.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.906000 audit: BPF prog-id=23 op=LOAD Oct 2 19:05:20.907159 systemd[1]: Started systemd-udevd.service. Oct 2 19:05:20.908684 systemd[1]: Starting systemd-networkd.service... Oct 2 19:05:20.927000 audit: BPF prog-id=24 op=LOAD Oct 2 19:05:20.927000 audit: BPF prog-id=25 op=LOAD Oct 2 19:05:20.927000 audit: BPF prog-id=26 op=LOAD Oct 2 19:05:20.929154 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:05:20.940254 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:05:20.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:20.958543 systemd[1]: Started systemd-userdbd.service. Oct 2 19:05:21.009514 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:05:21.030528 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1048) Oct 2 19:05:21.031513 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:05:21.052736 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:05:21.057395 systemd-networkd[1052]: lo: Link UP Oct 2 19:05:21.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:21.057399 systemd-networkd[1052]: lo: Gained carrier Oct 2 19:05:21.057698 systemd-networkd[1052]: Enumeration completed Oct 2 19:05:21.057756 systemd-networkd[1052]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Oct 2 19:05:21.057960 systemd[1]: Started systemd-networkd.service. Oct 2 19:05:21.061203 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Oct 2 19:05:21.061312 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Oct 2 19:05:21.061398 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Oct 2 19:05:21.062345 systemd-networkd[1052]: ens192: Link UP Oct 2 19:05:21.062423 systemd-networkd[1052]: ens192: Gained carrier Oct 2 19:05:21.065000 audit[1045]: AVC avc: denied { confidentiality } for pid=1045 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:05:21.073555 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Oct 2 19:05:21.073689 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Oct 2 19:05:21.065000 audit[1045]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556d6dd3b830 a1=32194 a2=7f3717397bc5 a3=5 items=106 ppid=1044 pid=1045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:21.065000 audit: CWD cwd="/" Oct 2 19:05:21.065000 audit: PATH item=0 name=(null) inode=24542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=1 name=(null) inode=24543 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=2 name=(null) inode=24542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=3 name=(null) inode=24544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=4 name=(null) inode=24542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=5 name=(null) inode=24545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=6 name=(null) inode=24545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=7 name=(null) inode=24546 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=8 name=(null) inode=24545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=9 name=(null) inode=24547 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=10 name=(null) inode=24545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=11 name=(null) inode=24548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=12 name=(null) inode=24545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=13 name=(null) inode=24549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=14 name=(null) inode=24545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=15 name=(null) inode=24550 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=16 name=(null) inode=24542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=17 name=(null) inode=24551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=18 name=(null) inode=24551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=19 name=(null) inode=24552 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=20 name=(null) inode=24551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=21 name=(null) inode=24553 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=22 name=(null) inode=24551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=23 name=(null) inode=24554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=24 name=(null) inode=24551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=25 name=(null) inode=24555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=26 name=(null) inode=24551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=27 name=(null) inode=24556 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=28 name=(null) inode=24542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=29 name=(null) inode=24557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=30 name=(null) inode=24557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=31 name=(null) inode=24558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=32 name=(null) inode=24557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.076594 kernel: Guest personality initialized and is active Oct 2 19:05:21.065000 audit: PATH item=33 name=(null) inode=24559 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=34 name=(null) inode=24557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=35 name=(null) inode=24560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=36 name=(null) inode=24557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=37 name=(null) inode=24561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=38 name=(null) inode=24557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=39 name=(null) inode=24562 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=40 name=(null) inode=24542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=41 name=(null) inode=24563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=42 name=(null) inode=24563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=43 name=(null) inode=24564 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=44 name=(null) inode=24563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=45 name=(null) inode=24565 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=46 name=(null) inode=24563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=47 name=(null) inode=24566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=48 name=(null) inode=24563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=49 name=(null) inode=24567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=50 name=(null) inode=24563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=51 name=(null) inode=24568 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=52 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=53 name=(null) inode=24569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=54 name=(null) inode=24569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=55 name=(null) inode=24570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=56 name=(null) inode=24569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=57 name=(null) inode=24571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=58 name=(null) inode=24569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=59 name=(null) inode=24572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=60 name=(null) inode=24572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=61 name=(null) inode=24573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=62 name=(null) inode=24572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=63 name=(null) inode=24574 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=64 name=(null) inode=24572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=65 name=(null) inode=24575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=66 name=(null) inode=24572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.078663 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Oct 2 19:05:21.065000 audit: PATH item=67 name=(null) inode=24576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=68 name=(null) inode=24572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=69 name=(null) inode=25601 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=70 name=(null) inode=24569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=71 name=(null) inode=25602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=72 name=(null) inode=25602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=73 name=(null) inode=25603 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=74 name=(null) inode=25602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=75 name=(null) inode=25604 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=76 name=(null) inode=25602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=77 name=(null) inode=25605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=78 name=(null) inode=25602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=79 name=(null) inode=25606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=80 name=(null) inode=25602 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=81 name=(null) inode=25607 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=82 name=(null) inode=24569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=83 name=(null) inode=25608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=84 name=(null) inode=25608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=85 name=(null) inode=25609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=86 name=(null) inode=25608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=87 name=(null) inode=25610 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=88 name=(null) inode=25608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=89 name=(null) inode=25611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=90 name=(null) inode=25608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=91 name=(null) inode=25612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=92 name=(null) inode=25608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=93 name=(null) inode=25613 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=94 name=(null) inode=24569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=95 name=(null) inode=25614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=96 name=(null) inode=25614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=97 name=(null) inode=25615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=98 name=(null) inode=25614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=99 name=(null) inode=25616 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=100 name=(null) inode=25614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=101 name=(null) inode=25617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=102 name=(null) inode=25614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=103 name=(null) inode=25618 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=104 name=(null) inode=25614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PATH item=105 name=(null) inode=25619 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:05:21.065000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:05:21.082682 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Oct 2 19:05:21.082744 kernel: Initialized host personality Oct 2 19:05:21.100072 (udev-worker)[1045]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Oct 2 19:05:21.105511 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Oct 2 19:05:21.108524 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:05:21.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:21.127835 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:05:21.128834 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:05:21.147178 lvm[1077]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:05:21.171155 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:05:21.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:21.171373 systemd[1]: Reached target cryptsetup.target. Oct 2 19:05:21.172475 systemd[1]: Starting lvm2-activation.service... Oct 2 19:05:21.175659 lvm[1078]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:05:21.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:21.198205 systemd[1]: Finished lvm2-activation.service. Oct 2 19:05:21.198432 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:05:21.198574 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:05:21.198592 systemd[1]: Reached target local-fs.target. Oct 2 19:05:21.198716 systemd[1]: Reached target machines.target. Oct 2 19:05:21.199930 systemd[1]: Starting ldconfig.service... Oct 2 19:05:21.210728 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:05:21.210763 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:05:21.211717 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:05:21.212547 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:05:21.213591 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:05:21.213802 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:05:21.213842 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:05:21.214840 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:05:21.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:21.234395 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:05:21.235571 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1080 (bootctl) Oct 2 19:05:21.236388 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:05:21.351507 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:05:21.431021 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:05:21.597403 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:05:22.049451 systemd-fsck[1090]: fsck.fat 4.2 (2021-01-31) Oct 2 19:05:22.049451 systemd-fsck[1090]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:05:22.050625 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:05:22.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:22.051655 systemd[1]: Mounting boot.mount... Oct 2 19:05:22.087233 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:05:22.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:22.088408 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:05:22.098859 systemd[1]: Mounted boot.mount. Oct 2 19:05:22.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:22.108380 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:05:22.171604 systemd-networkd[1052]: ens192: Gained IPv6LL Oct 2 19:05:22.195338 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:05:22.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:22.197000 audit: BPF prog-id=27 op=LOAD Oct 2 19:05:22.198000 audit: BPF prog-id=28 op=LOAD Oct 2 19:05:22.196656 systemd[1]: Starting audit-rules.service... Oct 2 19:05:22.197580 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:05:22.198471 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:05:22.199661 systemd[1]: Starting systemd-resolved.service... Oct 2 19:05:22.200824 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:05:22.201694 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:05:22.208000 audit[1099]: SYSTEM_BOOT pid=1099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:05:22.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:22.210396 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:05:22.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:22.214575 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:05:22.214709 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:05:22.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:05:22.233985 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:05:22.246000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:05:22.246000 audit[1113]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd99a0e60 a2=420 a3=0 items=0 ppid=1093 pid=1113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:05:22.246000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:05:22.248336 augenrules[1113]: No rules Oct 2 19:05:22.248785 systemd[1]: Finished audit-rules.service. Oct 2 19:05:22.254782 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:05:22.254939 systemd[1]: Reached target time-set.target. Oct 2 19:05:22.258096 systemd-resolved[1097]: Positive Trust Anchors: Oct 2 19:05:22.258282 systemd-resolved[1097]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:05:22.258369 systemd-resolved[1097]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:05:22.323384 systemd-resolved[1097]: Defaulting to hostname 'linux'. Oct 2 19:05:22.324588 systemd[1]: Started systemd-resolved.service. Oct 2 19:05:22.324795 systemd[1]: Reached target network.target. Oct 2 19:05:22.324908 systemd[1]: Reached target nss-lookup.target. Oct 2 19:05:22.452950 ldconfig[1079]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:05:22.468042 systemd[1]: Finished ldconfig.service. Oct 2 19:05:22.469282 systemd[1]: Starting systemd-update-done.service... Oct 2 19:05:22.474683 systemd[1]: Finished systemd-update-done.service. Oct 2 19:05:22.474869 systemd[1]: Reached target sysinit.target. Oct 2 19:05:22.475038 systemd[1]: Started motdgen.path. Oct 2 19:05:22.475162 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:05:22.475385 systemd[1]: Started logrotate.timer. Oct 2 19:05:22.475587 systemd[1]: Started mdadm.timer. Oct 2 19:05:22.475696 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:05:22.475814 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:05:22.475835 systemd[1]: Reached target paths.target. Oct 2 19:05:22.475946 systemd[1]: Reached target timers.target. Oct 2 19:05:22.476339 systemd[1]: Listening on dbus.socket. Oct 2 19:05:22.477370 systemd[1]: Starting docker.socket... Oct 2 19:05:22.479684 systemd[1]: Listening on sshd.socket. Oct 2 19:05:22.479948 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:05:22.480301 systemd[1]: Listening on docker.socket. Oct 2 19:05:22.480689 systemd[1]: Reached target sockets.target. Oct 2 19:05:22.480879 systemd[1]: Reached target basic.target. Oct 2 19:05:22.481087 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:05:22.481172 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:05:22.482034 systemd[1]: Starting containerd.service... Oct 2 19:05:22.483173 systemd[1]: Starting dbus.service... Oct 2 19:05:22.484176 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:05:22.485195 systemd[1]: Starting extend-filesystems.service... Oct 2 19:05:22.485854 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:05:22.488563 jq[1124]: false Oct 2 19:05:22.489158 systemd[1]: Starting motdgen.service... Oct 2 19:05:22.490715 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:05:22.492433 systemd[1]: Starting prepare-critools.service... Oct 2 19:05:56.151306 systemd-resolved[1097]: Clock change detected. Flushing caches. Oct 2 19:05:56.151377 systemd-timesyncd[1098]: Contacted time server 66.228.58.20:123 (0.flatcar.pool.ntp.org). Oct 2 19:05:56.151407 systemd-timesyncd[1098]: Initial clock synchronization to Mon 2023-10-02 19:05:56.151280 UTC. Oct 2 19:05:56.152189 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:05:56.153507 systemd[1]: Starting sshd-keygen.service... Oct 2 19:05:56.155105 systemd[1]: Starting systemd-logind.service... Oct 2 19:05:56.156686 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:05:56.156718 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:05:56.157098 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:05:56.157447 systemd[1]: Starting update-engine.service... Oct 2 19:05:56.158157 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:05:56.159274 systemd[1]: Starting vmtoolsd.service... Oct 2 19:05:56.161308 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:05:56.161445 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:05:56.162223 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:05:56.162354 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:05:56.165962 jq[1138]: true Oct 2 19:05:56.171526 systemd[1]: Started vmtoolsd.service. Oct 2 19:05:56.177874 jq[1148]: true Oct 2 19:05:56.183778 tar[1144]: ./ Oct 2 19:05:56.183778 tar[1144]: ./loopback Oct 2 19:05:56.184980 tar[1145]: crictl Oct 2 19:05:56.188898 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:05:56.188996 systemd[1]: Finished motdgen.service. Oct 2 19:05:56.192027 extend-filesystems[1125]: Found sda Oct 2 19:05:56.192236 extend-filesystems[1125]: Found sda1 Oct 2 19:05:56.192236 extend-filesystems[1125]: Found sda2 Oct 2 19:05:56.192236 extend-filesystems[1125]: Found sda3 Oct 2 19:05:56.192236 extend-filesystems[1125]: Found usr Oct 2 19:05:56.192236 extend-filesystems[1125]: Found sda4 Oct 2 19:05:56.192236 extend-filesystems[1125]: Found sda6 Oct 2 19:05:56.192236 extend-filesystems[1125]: Found sda7 Oct 2 19:05:56.192236 extend-filesystems[1125]: Found sda9 Oct 2 19:05:56.192236 extend-filesystems[1125]: Checking size of /dev/sda9 Oct 2 19:05:56.211855 extend-filesystems[1125]: Old size kept for /dev/sda9 Oct 2 19:05:56.211855 extend-filesystems[1125]: Found sr0 Oct 2 19:05:56.211942 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:05:56.212428 systemd[1]: Finished extend-filesystems.service. Oct 2 19:05:56.246359 dbus-daemon[1123]: [system] SELinux support is enabled Oct 2 19:05:56.246448 systemd[1]: Started dbus.service. Oct 2 19:05:56.247800 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:05:56.247821 systemd[1]: Reached target system-config.target. Oct 2 19:05:56.247935 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:05:56.247944 systemd[1]: Reached target user-config.target. Oct 2 19:05:56.270890 bash[1174]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:05:56.272540 env[1146]: time="2023-10-02T19:05:56.272503745Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:05:56.274019 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:05:56.275365 systemd-logind[1135]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:05:56.276845 kernel: NET: Registered PF_VSOCK protocol family Oct 2 19:05:56.275376 systemd-logind[1135]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:05:56.276752 systemd-logind[1135]: New seat seat0. Oct 2 19:05:56.279657 systemd[1]: Started systemd-logind.service. Oct 2 19:05:56.283959 tar[1144]: ./bandwidth Oct 2 19:05:56.292062 update_engine[1137]: I1002 19:05:56.291219 1137 main.cc:92] Flatcar Update Engine starting Oct 2 19:05:56.293592 systemd[1]: Started update-engine.service. Oct 2 19:05:56.293716 update_engine[1137]: I1002 19:05:56.293612 1137 update_check_scheduler.cc:74] Next update check in 4m32s Oct 2 19:05:56.295008 systemd[1]: Started locksmithd.service. Oct 2 19:05:56.318032 env[1146]: time="2023-10-02T19:05:56.318001178Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:05:56.318118 env[1146]: time="2023-10-02T19:05:56.318105136Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.319863484Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.319880761Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.319992756Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.320004288Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.320011778Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.320017504Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.320067926Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.320206716Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.320269393Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:05:56.320391 env[1146]: time="2023-10-02T19:05:56.320278287Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:05:56.320565 env[1146]: time="2023-10-02T19:05:56.320309161Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:05:56.320565 env[1146]: time="2023-10-02T19:05:56.320316892Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331497443Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331521750Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331533764Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331554833Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331564240Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331571829Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331578656Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331585810Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331593074Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331600185Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331620450Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331628298Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331685837Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:05:56.333814 env[1146]: time="2023-10-02T19:05:56.331730342Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:05:56.332817 systemd[1]: Started containerd.service. Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331875618Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331891568Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331899054Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331927966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331936041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331942639Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331949271Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331955704Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331962109Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331967984Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331974584Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.331982783Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.332048555Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.332059758Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334104 env[1146]: time="2023-10-02T19:05:56.332066462Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334380 env[1146]: time="2023-10-02T19:05:56.332072820Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:05:56.334380 env[1146]: time="2023-10-02T19:05:56.332085652Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:05:56.334380 env[1146]: time="2023-10-02T19:05:56.332096925Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:05:56.334380 env[1146]: time="2023-10-02T19:05:56.332113396Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:05:56.334380 env[1146]: time="2023-10-02T19:05:56.332141856Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:05:56.334459 env[1146]: time="2023-10-02T19:05:56.332259424Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:05:56.334459 env[1146]: time="2023-10-02T19:05:56.332292970Z" level=info msg="Connect containerd service" Oct 2 19:05:56.334459 env[1146]: time="2023-10-02T19:05:56.332320112Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:05:56.334459 env[1146]: time="2023-10-02T19:05:56.332600663Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:05:56.334459 env[1146]: time="2023-10-02T19:05:56.332720539Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:05:56.334459 env[1146]: time="2023-10-02T19:05:56.332742648Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:05:56.334459 env[1146]: time="2023-10-02T19:05:56.332768343Z" level=info msg="containerd successfully booted in 0.084241s" Oct 2 19:05:56.348711 env[1146]: time="2023-10-02T19:05:56.348675330Z" level=info msg="Start subscribing containerd event" Oct 2 19:05:56.348789 env[1146]: time="2023-10-02T19:05:56.348778044Z" level=info msg="Start recovering state" Oct 2 19:05:56.348992 env[1146]: time="2023-10-02T19:05:56.348980341Z" level=info msg="Start event monitor" Oct 2 19:05:56.349025 env[1146]: time="2023-10-02T19:05:56.348994937Z" level=info msg="Start snapshots syncer" Oct 2 19:05:56.349025 env[1146]: time="2023-10-02T19:05:56.349001403Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:05:56.349025 env[1146]: time="2023-10-02T19:05:56.349008348Z" level=info msg="Start streaming server" Oct 2 19:05:56.359507 tar[1144]: ./ptp Oct 2 19:05:56.425238 tar[1144]: ./vlan Oct 2 19:05:56.481997 tar[1144]: ./host-device Oct 2 19:05:56.532534 tar[1144]: ./tuning Oct 2 19:05:56.579850 tar[1144]: ./vrf Oct 2 19:05:56.595149 systemd[1]: Finished prepare-critools.service. Oct 2 19:05:56.608394 tar[1144]: ./sbr Oct 2 19:05:56.630852 tar[1144]: ./tap Oct 2 19:05:56.655712 tar[1144]: ./dhcp Oct 2 19:05:56.719458 tar[1144]: ./static Oct 2 19:05:56.737106 tar[1144]: ./firewall Oct 2 19:05:56.765888 tar[1144]: ./macvlan Oct 2 19:05:56.790853 tar[1144]: ./dummy Oct 2 19:05:56.816813 tar[1144]: ./bridge Oct 2 19:05:56.845051 tar[1144]: ./ipvlan Oct 2 19:05:56.870412 tar[1144]: ./portmap Oct 2 19:05:56.894875 tar[1144]: ./host-local Oct 2 19:05:56.923390 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:05:56.983360 locksmithd[1188]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:05:57.064201 sshd_keygen[1143]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:05:57.075931 systemd[1]: Finished sshd-keygen.service. Oct 2 19:05:57.077003 systemd[1]: Starting issuegen.service... Oct 2 19:05:57.080161 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:05:57.080240 systemd[1]: Finished issuegen.service. Oct 2 19:05:57.081195 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:05:57.088436 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:05:57.089281 systemd[1]: Started getty@tty1.service. Oct 2 19:05:57.090111 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:05:57.090302 systemd[1]: Reached target getty.target. Oct 2 19:05:57.090440 systemd[1]: Reached target multi-user.target. Oct 2 19:05:57.091295 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:05:57.095374 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:05:57.095456 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:05:57.095612 systemd[1]: Startup finished in 926ms (kernel) + 10.805s (initrd) + 5.084s (userspace) = 16.815s. Oct 2 19:05:57.114752 login[1257]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 19:05:57.115220 login[1256]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:05:57.122042 systemd[1]: Created slice user-500.slice. Oct 2 19:05:57.122787 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:05:57.125843 systemd-logind[1135]: New session 2 of user core. Oct 2 19:05:57.128136 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:05:57.129057 systemd[1]: Starting user@500.service... Oct 2 19:05:57.130895 (systemd)[1260]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:05:57.172715 systemd[1260]: Queued start job for default target default.target. Oct 2 19:05:57.173012 systemd[1260]: Reached target paths.target. Oct 2 19:05:57.173029 systemd[1260]: Reached target sockets.target. Oct 2 19:05:57.173037 systemd[1260]: Reached target timers.target. Oct 2 19:05:57.173044 systemd[1260]: Reached target basic.target. Oct 2 19:05:57.173065 systemd[1260]: Reached target default.target. Oct 2 19:05:57.173080 systemd[1260]: Startup finished in 39ms. Oct 2 19:05:57.173101 systemd[1]: Started user@500.service. Oct 2 19:05:57.173813 systemd[1]: Started session-2.scope. Oct 2 19:05:58.116420 login[1257]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:05:58.120374 systemd[1]: Started session-1.scope. Oct 2 19:05:58.120946 systemd-logind[1135]: New session 1 of user core. Oct 2 19:06:36.336910 systemd[1]: Created slice system-sshd.slice. Oct 2 19:06:36.337810 systemd[1]: Started sshd@0-139.178.70.107:22-86.109.11.97:60596.service. Oct 2 19:06:36.455151 sshd[1283]: Accepted publickey for core from 86.109.11.97 port 60596 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:06:36.455962 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:36.459809 systemd[1]: Started session-3.scope. Oct 2 19:06:36.460136 systemd-logind[1135]: New session 3 of user core. Oct 2 19:06:36.509966 systemd[1]: Started sshd@1-139.178.70.107:22-86.109.11.97:60600.service. Oct 2 19:06:36.552348 sshd[1288]: Accepted publickey for core from 86.109.11.97 port 60600 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:06:36.553140 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:36.556092 systemd[1]: Started session-4.scope. Oct 2 19:06:36.556176 systemd-logind[1135]: New session 4 of user core. Oct 2 19:06:36.610476 systemd[1]: Started sshd@2-139.178.70.107:22-86.109.11.97:60608.service. Oct 2 19:06:36.610997 sshd[1288]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:36.612850 systemd[1]: sshd@1-139.178.70.107:22-86.109.11.97:60600.service: Deactivated successfully. Oct 2 19:06:36.613435 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:06:36.613995 systemd-logind[1135]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:06:36.614634 systemd-logind[1135]: Removed session 4. Oct 2 19:06:36.641377 sshd[1293]: Accepted publickey for core from 86.109.11.97 port 60608 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:06:36.642261 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:36.645875 systemd-logind[1135]: New session 5 of user core. Oct 2 19:06:36.646120 systemd[1]: Started session-5.scope. Oct 2 19:06:36.696758 sshd[1293]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:36.699035 systemd[1]: sshd@2-139.178.70.107:22-86.109.11.97:60608.service: Deactivated successfully. Oct 2 19:06:36.699471 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:06:36.700159 systemd-logind[1135]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:06:36.700970 systemd[1]: Started sshd@3-139.178.70.107:22-86.109.11.97:60614.service. Oct 2 19:06:36.701881 systemd-logind[1135]: Removed session 5. Oct 2 19:06:36.730999 sshd[1300]: Accepted publickey for core from 86.109.11.97 port 60614 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:06:36.731885 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:36.734749 systemd-logind[1135]: New session 6 of user core. Oct 2 19:06:36.735263 systemd[1]: Started session-6.scope. Oct 2 19:06:36.786268 sshd[1300]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:36.789002 systemd[1]: sshd@3-139.178.70.107:22-86.109.11.97:60614.service: Deactivated successfully. Oct 2 19:06:36.789403 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:06:36.789988 systemd-logind[1135]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:06:36.790733 systemd[1]: Started sshd@4-139.178.70.107:22-86.109.11.97:60628.service. Oct 2 19:06:36.793008 systemd-logind[1135]: Removed session 6. Oct 2 19:06:36.819732 sshd[1306]: Accepted publickey for core from 86.109.11.97 port 60628 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:06:36.820711 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:36.824080 systemd[1]: Started session-7.scope. Oct 2 19:06:36.824419 systemd-logind[1135]: New session 7 of user core. Oct 2 19:06:37.009922 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:06:37.010042 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:06:37.016975 dbus-daemon[1123]: \xd0\u000d: received setenforce notice (enforcing=2119984176) Oct 2 19:06:37.018212 sudo[1309]: pam_unix(sudo:session): session closed for user root Oct 2 19:06:37.021930 sshd[1306]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:37.024560 systemd[1]: Started sshd@5-139.178.70.107:22-86.109.11.97:60644.service. Oct 2 19:06:37.025019 systemd[1]: sshd@4-139.178.70.107:22-86.109.11.97:60628.service: Deactivated successfully. Oct 2 19:06:37.025507 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:06:37.026787 systemd-logind[1135]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:06:37.027725 systemd-logind[1135]: Removed session 7. Oct 2 19:06:37.053620 sshd[1312]: Accepted publickey for core from 86.109.11.97 port 60644 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:06:37.054991 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:37.058404 systemd-logind[1135]: New session 8 of user core. Oct 2 19:06:37.058789 systemd[1]: Started session-8.scope. Oct 2 19:06:37.109851 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:06:37.110003 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:06:37.111978 sudo[1317]: pam_unix(sudo:session): session closed for user root Oct 2 19:06:37.115232 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:06:37.115378 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:06:37.122178 systemd[1]: Stopping audit-rules.service... Oct 2 19:06:37.122000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:06:37.123992 auditctl[1320]: No rules Oct 2 19:06:37.127218 kernel: kauditd_printk_skb: 231 callbacks suppressed Oct 2 19:06:37.127262 kernel: audit: type=1305 audit(1696273597.122:163): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:06:37.130848 kernel: audit: type=1300 audit(1696273597.122:163): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdac9f46a0 a2=420 a3=0 items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:37.122000 audit[1320]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdac9f46a0 a2=420 a3=0 items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:37.127458 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:06:37.127575 systemd[1]: Stopped audit-rules.service. Oct 2 19:06:37.128820 systemd[1]: Starting audit-rules.service... Oct 2 19:06:37.122000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:06:37.135938 kernel: audit: type=1327 audit(1696273597.122:163): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:06:37.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.138975 kernel: audit: type=1131 audit(1696273597.126:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.145039 augenrules[1337]: No rules Oct 2 19:06:37.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.145412 systemd[1]: Finished audit-rules.service. Oct 2 19:06:37.148325 sudo[1316]: pam_unix(sudo:session): session closed for user root Oct 2 19:06:37.147000 audit[1316]: USER_END pid=1316 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.151576 kernel: audit: type=1130 audit(1696273597.144:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.151613 kernel: audit: type=1106 audit(1696273597.147:166): pid=1316 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.153650 kernel: audit: type=1104 audit(1696273597.147:167): pid=1316 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.147000 audit[1316]: CRED_DISP pid=1316 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.153136 systemd[1]: sshd@5-139.178.70.107:22-86.109.11.97:60644.service: Deactivated successfully. Oct 2 19:06:37.151726 sshd[1312]: pam_unix(sshd:session): session closed for user core Oct 2 19:06:37.153441 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:06:37.151000 audit[1312]: USER_END pid=1312 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:06:37.156136 systemd-logind[1135]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:06:37.156705 systemd[1]: Started sshd@6-139.178.70.107:22-86.109.11.97:60648.service. Oct 2 19:06:37.160028 kernel: audit: type=1106 audit(1696273597.151:168): pid=1312 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:06:37.151000 audit[1312]: CRED_DISP pid=1312 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:06:37.163204 kernel: audit: type=1104 audit(1696273597.151:169): pid=1312 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:06:37.163280 systemd-logind[1135]: Removed session 8. Oct 2 19:06:37.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.107:22-86.109.11.97:60644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.166353 kernel: audit: type=1131 audit(1696273597.152:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.107:22-86.109.11.97:60644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-86.109.11.97:60648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.185000 audit[1344]: USER_ACCT pid=1344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:06:37.186431 sshd[1344]: Accepted publickey for core from 86.109.11.97 port 60648 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:06:37.186000 audit[1344]: CRED_ACQ pid=1344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:06:37.186000 audit[1344]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3cb22dc0 a2=3 a3=0 items=0 ppid=1 pid=1344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:37.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:06:37.187726 sshd[1344]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:06:37.190103 systemd-logind[1135]: New session 9 of user core. Oct 2 19:06:37.190933 systemd[1]: Started session-9.scope. Oct 2 19:06:37.193000 audit[1344]: USER_START pid=1344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:06:37.193000 audit[1346]: CRED_ACQ pid=1346 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:06:37.240792 sudo[1347]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:06:37.240960 sudo[1347]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:06:37.239000 audit[1347]: USER_ACCT pid=1347 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.240000 audit[1347]: CRED_REFR pid=1347 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.241000 audit[1347]: USER_START pid=1347 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.830072 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:06:37.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:37.844853 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:06:37.845213 systemd[1]: Reached target network-online.target. Oct 2 19:06:37.846378 systemd[1]: Starting docker.service... Oct 2 19:06:37.872204 env[1363]: time="2023-10-02T19:06:37.872173348Z" level=info msg="Starting up" Oct 2 19:06:37.873199 env[1363]: time="2023-10-02T19:06:37.873179372Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:06:37.873199 env[1363]: time="2023-10-02T19:06:37.873194406Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:06:37.873258 env[1363]: time="2023-10-02T19:06:37.873207085Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:06:37.873258 env[1363]: time="2023-10-02T19:06:37.873216554Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:06:37.874233 env[1363]: time="2023-10-02T19:06:37.874217249Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:06:37.874233 env[1363]: time="2023-10-02T19:06:37.874227889Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:06:37.874293 env[1363]: time="2023-10-02T19:06:37.874236235Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:06:37.874293 env[1363]: time="2023-10-02T19:06:37.874241084Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:06:38.038034 env[1363]: time="2023-10-02T19:06:38.037999931Z" level=info msg="Loading containers: start." Oct 2 19:06:38.119000 audit[1394]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.119000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffee6d6f6a0 a2=0 a3=7ffee6d6f68c items=0 ppid=1363 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.119000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:06:38.120000 audit[1396]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.120000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc0e783350 a2=0 a3=7ffc0e78333c items=0 ppid=1363 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:06:38.122000 audit[1398]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.122000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdcab6da50 a2=0 a3=7ffdcab6da3c items=0 ppid=1363 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:06:38.123000 audit[1400]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.123000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdf106cf20 a2=0 a3=7ffdf106cf0c items=0 ppid=1363 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:06:38.130000 audit[1402]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.130000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc6aec780 a2=0 a3=7ffcc6aec76c items=0 ppid=1363 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.130000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:06:38.156000 audit[1407]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.156000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9bd8d320 a2=0 a3=7ffc9bd8d30c items=0 ppid=1363 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.156000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:06:38.206000 audit[1409]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.206000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcfba6e030 a2=0 a3=7ffcfba6e01c items=0 ppid=1363 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:06:38.207000 audit[1411]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.207000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe767a4220 a2=0 a3=7ffe767a420c items=0 ppid=1363 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.207000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:06:38.209000 audit[1413]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.209000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffbc679be0 a2=0 a3=7fffbc679bcc items=0 ppid=1363 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.209000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:06:38.255000 audit[1417]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.255000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdebf87810 a2=0 a3=7ffdebf877fc items=0 ppid=1363 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.255000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:06:38.256000 audit[1418]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.256000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdf45f8950 a2=0 a3=7ffdf45f893c items=0 ppid=1363 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.256000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:06:38.307821 kernel: Initializing XFRM netlink socket Oct 2 19:06:38.391467 env[1363]: time="2023-10-02T19:06:38.390230909Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:06:38.427000 audit[1426]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.427000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcbf0f9950 a2=0 a3=7ffcbf0f993c items=0 ppid=1363 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.427000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:06:38.442000 audit[1429]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.442000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc9f437bc0 a2=0 a3=7ffc9f437bac items=0 ppid=1363 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:06:38.444000 audit[1432]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.444000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe431aae50 a2=0 a3=7ffe431aae3c items=0 ppid=1363 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.444000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:06:38.445000 audit[1434]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.445000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe28b47130 a2=0 a3=7ffe28b4711c items=0 ppid=1363 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.445000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:06:38.447000 audit[1436]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.447000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffca051a730 a2=0 a3=7ffca051a71c items=0 ppid=1363 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.447000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:06:38.448000 audit[1438]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.448000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd89196720 a2=0 a3=7ffd8919670c items=0 ppid=1363 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:06:38.449000 audit[1440]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.449000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffbc3ca1f0 a2=0 a3=7fffbc3ca1dc items=0 ppid=1363 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:06:38.470000 audit[1443]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.470000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffea728e600 a2=0 a3=7ffea728e5ec items=0 ppid=1363 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.470000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:06:38.471000 audit[1445]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.471000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe385cee10 a2=0 a3=7ffe385cedfc items=0 ppid=1363 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:06:38.473000 audit[1447]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.473000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcead5a910 a2=0 a3=7ffcead5a8fc items=0 ppid=1363 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.473000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:06:38.474000 audit[1449]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.474000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffcf35b480 a2=0 a3=7fffcf35b46c items=0 ppid=1363 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:06:38.475642 systemd-networkd[1052]: docker0: Link UP Oct 2 19:06:38.520000 audit[1453]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.520000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0931a880 a2=0 a3=7ffe0931a86c items=0 ppid=1363 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.520000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:06:38.520000 audit[1454]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:06:38.520000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcab9148a0 a2=0 a3=7ffcab91488c items=0 ppid=1363 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:06:38.520000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:06:38.522026 env[1363]: time="2023-10-02T19:06:38.522005402Z" level=info msg="Loading containers: done." Oct 2 19:06:38.527736 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3673480420-merged.mount: Deactivated successfully. Oct 2 19:06:38.677518 env[1363]: time="2023-10-02T19:06:38.676669949Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:06:38.677518 env[1363]: time="2023-10-02T19:06:38.677232956Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:06:38.677518 env[1363]: time="2023-10-02T19:06:38.677334257Z" level=info msg="Daemon has completed initialization" Oct 2 19:06:38.727387 env[1363]: time="2023-10-02T19:06:38.727353528Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:06:38.727838 systemd[1]: Started docker.service. Oct 2 19:06:38.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:38.741149 systemd[1]: Reloading. Oct 2 19:06:38.792739 /usr/lib/systemd/system-generators/torcx-generator[1501]: time="2023-10-02T19:06:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:06:38.793089 /usr/lib/systemd/system-generators/torcx-generator[1501]: time="2023-10-02T19:06:38Z" level=info msg="torcx already run" Oct 2 19:06:38.857765 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:06:38.857776 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:06:38.869036 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.905000 audit: BPF prog-id=34 op=LOAD Oct 2 19:06:38.905000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit: BPF prog-id=35 op=LOAD Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit: BPF prog-id=36 op=LOAD Oct 2 19:06:38.906000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:06:38.906000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit: BPF prog-id=37 op=LOAD Oct 2 19:06:38.906000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit: BPF prog-id=38 op=LOAD Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.907000 audit: BPF prog-id=39 op=LOAD Oct 2 19:06:38.907000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:06:38.907000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit: BPF prog-id=40 op=LOAD Oct 2 19:06:38.908000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.908000 audit: BPF prog-id=41 op=LOAD Oct 2 19:06:38.908000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit: BPF prog-id=42 op=LOAD Oct 2 19:06:38.909000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit: BPF prog-id=43 op=LOAD Oct 2 19:06:38.910000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit: BPF prog-id=44 op=LOAD Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit: BPF prog-id=45 op=LOAD Oct 2 19:06:38.910000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:06:38.910000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit: BPF prog-id=46 op=LOAD Oct 2 19:06:38.911000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit: BPF prog-id=47 op=LOAD Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:38.911000 audit: BPF prog-id=48 op=LOAD Oct 2 19:06:38.911000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:06:38.911000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:06:38.918262 systemd[1]: Started kubelet.service. Oct 2 19:06:38.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:38.974751 kubelet[1560]: E1002 19:06:38.972467 1560 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:06:38.976078 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:06:38.976159 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:06:38.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:06:40.735548 env[1146]: time="2023-10-02T19:06:40.735505148Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\"" Oct 2 19:06:41.283487 update_engine[1137]: I1002 19:06:41.283437 1137 update_attempter.cc:505] Updating boot flags... Oct 2 19:06:41.725187 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3238499440.mount: Deactivated successfully. Oct 2 19:06:44.273343 env[1146]: time="2023-10-02T19:06:44.273293621Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:44.292728 env[1146]: time="2023-10-02T19:06:44.292681441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:44.312288 env[1146]: time="2023-10-02T19:06:44.312269176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:44.321473 env[1146]: time="2023-10-02T19:06:44.321449432Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:44.322058 env[1146]: time="2023-10-02T19:06:44.322037389Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c\"" Oct 2 19:06:44.329682 env[1146]: time="2023-10-02T19:06:44.329659902Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\"" Oct 2 19:06:46.809563 env[1146]: time="2023-10-02T19:06:46.809515713Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:46.848725 env[1146]: time="2023-10-02T19:06:46.848700836Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:46.867855 env[1146]: time="2023-10-02T19:06:46.867837044Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:46.885297 env[1146]: time="2023-10-02T19:06:46.885275408Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:46.886006 env[1146]: time="2023-10-02T19:06:46.885983493Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988\"" Oct 2 19:06:46.893836 env[1146]: time="2023-10-02T19:06:46.893814158Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\"" Oct 2 19:06:48.718427 env[1146]: time="2023-10-02T19:06:48.718395755Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:48.740214 env[1146]: time="2023-10-02T19:06:48.740187354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:48.754226 env[1146]: time="2023-10-02T19:06:48.754195926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:48.763809 env[1146]: time="2023-10-02T19:06:48.763776842Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:48.764350 env[1146]: time="2023-10-02T19:06:48.764332103Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d\"" Oct 2 19:06:48.770041 env[1146]: time="2023-10-02T19:06:48.770024168Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 19:06:48.979475 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:06:48.979627 systemd[1]: Stopped kubelet.service. Oct 2 19:06:48.993648 kernel: kauditd_printk_skb: 259 callbacks suppressed Oct 2 19:06:48.993727 kernel: audit: type=1130 audit(1696273608.978:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:48.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:48.980720 systemd[1]: Started kubelet.service. Oct 2 19:06:48.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:48.998011 kernel: audit: type=1131 audit(1696273608.978:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:48.998050 kernel: audit: type=1130 audit(1696273608.979:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:48.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:49.027441 kubelet[1611]: E1002 19:06:49.027418 1611 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:06:49.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:06:49.029634 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:06:49.029706 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:06:49.032812 kernel: audit: type=1131 audit(1696273609.029:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:06:50.559451 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount464402641.mount: Deactivated successfully. Oct 2 19:06:51.111862 env[1146]: time="2023-10-02T19:06:51.111829364Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:51.133136 env[1146]: time="2023-10-02T19:06:51.133118058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:51.144874 env[1146]: time="2023-10-02T19:06:51.144849129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:51.158446 env[1146]: time="2023-10-02T19:06:51.158423670Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:51.158846 env[1146]: time="2023-10-02T19:06:51.158822821Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\"" Oct 2 19:06:51.165925 env[1146]: time="2023-10-02T19:06:51.165896198Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:06:51.940030 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3196518720.mount: Deactivated successfully. Oct 2 19:06:51.962029 env[1146]: time="2023-10-02T19:06:51.961984549Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:51.969947 env[1146]: time="2023-10-02T19:06:51.969921022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:51.970910 env[1146]: time="2023-10-02T19:06:51.970893487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:51.971668 env[1146]: time="2023-10-02T19:06:51.971647978Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:51.972108 env[1146]: time="2023-10-02T19:06:51.972086223Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:06:51.979010 env[1146]: time="2023-10-02T19:06:51.978988418Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Oct 2 19:06:53.024596 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2919044532.mount: Deactivated successfully. Oct 2 19:06:56.923471 env[1146]: time="2023-10-02T19:06:56.923439998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:56.924239 env[1146]: time="2023-10-02T19:06:56.924221141Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:56.925129 env[1146]: time="2023-10-02T19:06:56.925114641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:56.925992 env[1146]: time="2023-10-02T19:06:56.925977428Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:56.926421 env[1146]: time="2023-10-02T19:06:56.926403971Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Oct 2 19:06:56.935440 env[1146]: time="2023-10-02T19:06:56.935424729Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:06:57.375521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3902131285.mount: Deactivated successfully. Oct 2 19:06:57.988707 env[1146]: time="2023-10-02T19:06:57.988678435Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:58.008998 env[1146]: time="2023-10-02T19:06:58.008971475Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:58.014879 env[1146]: time="2023-10-02T19:06:58.014848737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:58.029075 env[1146]: time="2023-10-02T19:06:58.029052719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:06:58.029488 env[1146]: time="2023-10-02T19:06:58.029465727Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:06:59.229440 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:06:59.229564 systemd[1]: Stopped kubelet.service. Oct 2 19:06:59.237807 kernel: audit: type=1130 audit(1696273619.228:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.237853 kernel: audit: type=1131 audit(1696273619.228:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.232893 systemd[1]: Started kubelet.service. Oct 2 19:06:59.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.242806 kernel: audit: type=1130 audit(1696273619.232:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.272990 kubelet[1696]: E1002 19:06:59.272968 1696 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:06:59.274011 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:06:59.274086 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:06:59.276977 kernel: audit: type=1131 audit(1696273619.273:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:06:59.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:06:59.694145 systemd[1]: Stopped kubelet.service. Oct 2 19:06:59.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.699354 kernel: audit: type=1130 audit(1696273619.693:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.699391 kernel: audit: type=1131 audit(1696273619.693:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.708567 systemd[1]: Reloading. Oct 2 19:06:59.746721 /usr/lib/systemd/system-generators/torcx-generator[1725]: time="2023-10-02T19:06:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:06:59.746737 /usr/lib/systemd/system-generators/torcx-generator[1725]: time="2023-10-02T19:06:59Z" level=info msg="torcx already run" Oct 2 19:06:59.794406 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:06:59.794418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:06:59.805277 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847381 kernel: audit: type=1400 audit(1696273619.841:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847414 kernel: audit: type=1400 audit(1696273619.841:391): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847429 kernel: audit: type=1400 audit(1696273619.841:392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852083 kernel: audit: type=1400 audit(1696273619.841:393): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit: BPF prog-id=49 op=LOAD Oct 2 19:06:59.847000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit: BPF prog-id=50 op=LOAD Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.851000 audit: BPF prog-id=51 op=LOAD Oct 2 19:06:59.852000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:06:59.852000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit: BPF prog-id=52 op=LOAD Oct 2 19:06:59.852000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit: BPF prog-id=53 op=LOAD Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.853000 audit: BPF prog-id=54 op=LOAD Oct 2 19:06:59.853000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:06:59.853000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit: BPF prog-id=55 op=LOAD Oct 2 19:06:59.855000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.855000 audit: BPF prog-id=56 op=LOAD Oct 2 19:06:59.856000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.856000 audit: BPF prog-id=57 op=LOAD Oct 2 19:06:59.856000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit: BPF prog-id=58 op=LOAD Oct 2 19:06:59.858000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit: BPF prog-id=59 op=LOAD Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.858000 audit: BPF prog-id=60 op=LOAD Oct 2 19:06:59.859000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:06:59.859000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.859000 audit: BPF prog-id=61 op=LOAD Oct 2 19:06:59.859000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit: BPF prog-id=62 op=LOAD Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:06:59.860000 audit: BPF prog-id=63 op=LOAD Oct 2 19:06:59.860000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:06:59.860000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:06:59.872553 systemd[1]: Started kubelet.service. Oct 2 19:06:59.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.901572 kubelet[1785]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:06:59.901780 kubelet[1785]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:06:59.901834 kubelet[1785]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:06:59.901970 kubelet[1785]: I1002 19:06:59.901945 1785 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:07:00.019046 kubelet[1785]: I1002 19:07:00.019031 1785 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:07:00.019046 kubelet[1785]: I1002 19:07:00.019044 1785 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:07:00.019162 kubelet[1785]: I1002 19:07:00.019151 1785 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:07:00.021951 kubelet[1785]: E1002 19:07:00.021940 1785 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.107:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.022030 kubelet[1785]: I1002 19:07:00.022020 1785 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:07:00.023139 kubelet[1785]: I1002 19:07:00.023128 1785 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:07:00.023271 kubelet[1785]: I1002 19:07:00.023260 1785 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:07:00.023319 kubelet[1785]: I1002 19:07:00.023308 1785 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:07:00.023390 kubelet[1785]: I1002 19:07:00.023326 1785 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:07:00.023390 kubelet[1785]: I1002 19:07:00.023334 1785 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:07:00.023390 kubelet[1785]: I1002 19:07:00.023381 1785 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:07:00.026172 kubelet[1785]: I1002 19:07:00.026164 1785 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:07:00.026240 kubelet[1785]: I1002 19:07:00.026233 1785 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:07:00.026295 kubelet[1785]: I1002 19:07:00.026288 1785 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:07:00.026342 kubelet[1785]: I1002 19:07:00.026334 1785 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:07:00.027922 kubelet[1785]: W1002 19:07:00.027863 1785 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.107:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.027922 kubelet[1785]: E1002 19:07:00.027894 1785 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.107:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.027979 kubelet[1785]: I1002 19:07:00.027931 1785 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:07:00.028067 kubelet[1785]: W1002 19:07:00.028054 1785 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:07:00.028294 kubelet[1785]: I1002 19:07:00.028282 1785 server.go:1168] "Started kubelet" Oct 2 19:07:00.028000 audit[1785]: AVC avc: denied { mac_admin } for pid=1785 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:00.028000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:00.028000 audit[1785]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cc53b0 a1=c000be4978 a2=c000cc5380 a3=25 items=0 ppid=1 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.028000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:00.028000 audit[1785]: AVC avc: denied { mac_admin } for pid=1785 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:00.028000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:00.028000 audit[1785]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c2e880 a1=c000be4990 a2=c000cc5440 a3=25 items=0 ppid=1 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.028000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:00.029272 kubelet[1785]: I1002 19:07:00.029025 1785 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:07:00.029272 kubelet[1785]: I1002 19:07:00.029043 1785 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:07:00.029272 kubelet[1785]: I1002 19:07:00.029126 1785 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:07:00.030007 kubelet[1785]: E1002 19:07:00.029999 1785 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:07:00.030063 kubelet[1785]: E1002 19:07:00.030055 1785 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:07:00.030233 kubelet[1785]: W1002 19:07:00.030216 1785 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.107:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.030286 kubelet[1785]: E1002 19:07:00.030278 1785 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.107:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.030391 kubelet[1785]: E1002 19:07:00.030344 1785 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.178a5fdec3a6adb3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 0, 28272051, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 0, 28272051, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.70.107:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.107:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:07:00.032373 kubelet[1785]: I1002 19:07:00.032366 1785 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:07:00.032764 kubelet[1785]: I1002 19:07:00.032756 1785 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:07:00.033371 kubelet[1785]: I1002 19:07:00.033364 1785 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:07:00.033000 audit[1796]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:00.033000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc58bc2750 a2=0 a3=7ffc58bc273c items=0 ppid=1785 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:07:00.033000 audit[1797]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:00.033000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbbb49b80 a2=0 a3=7fffbbb49b6c items=0 ppid=1785 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:07:00.034893 kubelet[1785]: I1002 19:07:00.034765 1785 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:07:00.034977 kubelet[1785]: I1002 19:07:00.034969 1785 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:07:00.035181 kubelet[1785]: W1002 19:07:00.035158 1785 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.107:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.035236 kubelet[1785]: E1002 19:07:00.035229 1785 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.107:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.035394 kubelet[1785]: E1002 19:07:00.035387 1785 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.107:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.107:6443: connect: connection refused" interval="200ms" Oct 2 19:07:00.035000 audit[1799]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:00.035000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4ea28a70 a2=0 a3=7ffd4ea28a5c items=0 ppid=1785 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:07:00.036000 audit[1801]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:00.036000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffea687b80 a2=0 a3=7fffea687b6c items=0 ppid=1785 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:07:00.041000 audit[1804]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:00.041000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc7b8298e0 a2=0 a3=7ffc7b8298cc items=0 ppid=1785 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:07:00.043141 kubelet[1785]: I1002 19:07:00.043077 1785 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:07:00.042000 audit[1805]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:00.042000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8deea630 a2=0 a3=7ffd8deea61c items=0 ppid=1785 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:07:00.044127 kubelet[1785]: I1002 19:07:00.044043 1785 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:07:00.044127 kubelet[1785]: I1002 19:07:00.044067 1785 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:07:00.044127 kubelet[1785]: I1002 19:07:00.044078 1785 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:07:00.044127 kubelet[1785]: E1002 19:07:00.044109 1785 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:07:00.043000 audit[1806]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:00.043000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5b668d20 a2=0 a3=7fff5b668d0c items=0 ppid=1785 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:07:00.044000 audit[1807]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:00.044000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda3cefa00 a2=0 a3=7ffda3cef9ec items=0 ppid=1785 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:07:00.044000 audit[1808]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:00.044000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc848626e0 a2=0 a3=7ffc848626cc items=0 ppid=1785 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:07:00.045000 audit[1809]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:00.045000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5bc06bf0 a2=0 a3=7ffd5bc06bdc items=0 ppid=1785 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:07:00.046000 audit[1811]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:00.046000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff4eb29e10 a2=0 a3=7fff4eb29dfc items=0 ppid=1785 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:07:00.046000 audit[1812]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:00.046000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff2ced80c0 a2=0 a3=7fff2ced80ac items=0 ppid=1785 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:07:00.048301 kubelet[1785]: W1002 19:07:00.048276 1785 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.107:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.048338 kubelet[1785]: E1002 19:07:00.048304 1785 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.107:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:00.056378 kubelet[1785]: I1002 19:07:00.056370 1785 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:07:00.056437 kubelet[1785]: I1002 19:07:00.056431 1785 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:07:00.056482 kubelet[1785]: I1002 19:07:00.056476 1785 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:07:00.057287 kubelet[1785]: I1002 19:07:00.057279 1785 policy_none.go:49] "None policy: Start" Oct 2 19:07:00.057583 kubelet[1785]: I1002 19:07:00.057575 1785 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:07:00.057644 kubelet[1785]: I1002 19:07:00.057638 1785 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:07:00.060219 systemd[1]: Created slice kubepods.slice. Oct 2 19:07:00.062288 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:07:00.064095 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:07:00.068238 kubelet[1785]: I1002 19:07:00.068224 1785 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:07:00.067000 audit[1785]: AVC avc: denied { mac_admin } for pid=1785 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:00.067000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:00.067000 audit[1785]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f6cea0 a1=c00106eb88 a2=c000f6ce70 a3=25 items=0 ppid=1 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:00.067000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:00.068394 kubelet[1785]: I1002 19:07:00.068283 1785 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:07:00.068394 kubelet[1785]: I1002 19:07:00.068384 1785 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:07:00.069459 kubelet[1785]: E1002 19:07:00.069451 1785 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Oct 2 19:07:00.136431 kubelet[1785]: I1002 19:07:00.136399 1785 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:07:00.136716 kubelet[1785]: E1002 19:07:00.136708 1785 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.107:6443/api/v1/nodes\": dial tcp 139.178.70.107:6443: connect: connection refused" node="localhost" Oct 2 19:07:00.144894 kubelet[1785]: I1002 19:07:00.144886 1785 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:00.145412 kubelet[1785]: I1002 19:07:00.145404 1785 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:00.145998 kubelet[1785]: I1002 19:07:00.145988 1785 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:00.148932 systemd[1]: Created slice kubepods-burstable-pod80b8b8966aa7d1c422f3be2bfac9c13f.slice. Oct 2 19:07:00.156229 systemd[1]: Created slice kubepods-burstable-pod41d85f8b246864b883456a06817cf1d0.slice. Oct 2 19:07:00.162448 systemd[1]: Created slice kubepods-burstable-pod24fef87020af50fba838138f9686fc61.slice. Oct 2 19:07:00.236278 kubelet[1785]: E1002 19:07:00.236258 1785 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.107:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.107:6443: connect: connection refused" interval="400ms" Oct 2 19:07:00.336733 kubelet[1785]: I1002 19:07:00.336664 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:00.336878 kubelet[1785]: I1002 19:07:00.336869 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:00.336963 kubelet[1785]: I1002 19:07:00.336955 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:00.337037 kubelet[1785]: I1002 19:07:00.337030 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/24fef87020af50fba838138f9686fc61-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"24fef87020af50fba838138f9686fc61\") " pod="kube-system/kube-scheduler-localhost" Oct 2 19:07:00.337102 kubelet[1785]: I1002 19:07:00.337097 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/41d85f8b246864b883456a06817cf1d0-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"41d85f8b246864b883456a06817cf1d0\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:07:00.337169 kubelet[1785]: I1002 19:07:00.337154 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/41d85f8b246864b883456a06817cf1d0-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"41d85f8b246864b883456a06817cf1d0\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:07:00.337224 kubelet[1785]: I1002 19:07:00.337215 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:00.337288 kubelet[1785]: I1002 19:07:00.337282 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:00.337364 kubelet[1785]: I1002 19:07:00.337356 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/41d85f8b246864b883456a06817cf1d0-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"41d85f8b246864b883456a06817cf1d0\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:07:00.339306 kubelet[1785]: I1002 19:07:00.339295 1785 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:07:00.339530 kubelet[1785]: E1002 19:07:00.339512 1785 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.107:6443/api/v1/nodes\": dial tcp 139.178.70.107:6443: connect: connection refused" node="localhost" Oct 2 19:07:00.456835 env[1146]: time="2023-10-02T19:07:00.456506079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:80b8b8966aa7d1c422f3be2bfac9c13f,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:00.458525 env[1146]: time="2023-10-02T19:07:00.458498141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:41d85f8b246864b883456a06817cf1d0,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:00.463822 env[1146]: time="2023-10-02T19:07:00.463792745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:24fef87020af50fba838138f9686fc61,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:00.637291 kubelet[1785]: E1002 19:07:00.637007 1785 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.107:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.107:6443: connect: connection refused" interval="800ms" Oct 2 19:07:00.740753 kubelet[1785]: I1002 19:07:00.740731 1785 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:07:00.741112 kubelet[1785]: E1002 19:07:00.741094 1785 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.107:6443/api/v1/nodes\": dial tcp 139.178.70.107:6443: connect: connection refused" node="localhost" Oct 2 19:07:00.963075 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4171665797.mount: Deactivated successfully. Oct 2 19:07:00.963785 env[1146]: time="2023-10-02T19:07:00.963617997Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.964975 env[1146]: time="2023-10-02T19:07:00.964948565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.966060 env[1146]: time="2023-10-02T19:07:00.966041981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.966942 env[1146]: time="2023-10-02T19:07:00.966923849Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.967853 env[1146]: time="2023-10-02T19:07:00.967836704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.968318 env[1146]: time="2023-10-02T19:07:00.968302142Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.970358 env[1146]: time="2023-10-02T19:07:00.970343243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.974068 env[1146]: time="2023-10-02T19:07:00.974051540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.974875 env[1146]: time="2023-10-02T19:07:00.974862013Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.981758 env[1146]: time="2023-10-02T19:07:00.981744379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.982342 env[1146]: time="2023-10-02T19:07:00.982329294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.991436 env[1146]: time="2023-10-02T19:07:00.986783601Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:00.991436 env[1146]: time="2023-10-02T19:07:00.986813701Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:00.991436 env[1146]: time="2023-10-02T19:07:00.986821328Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:00.991436 env[1146]: time="2023-10-02T19:07:00.987362391Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cca3ff099bec8c95f77b7424aba25d8fa6ffe6bf0409b227e1928b50ed3d3389 pid=1823 runtime=io.containerd.runc.v2 Oct 2 19:07:00.991562 env[1146]: time="2023-10-02T19:07:00.991455653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:00.995544 env[1146]: time="2023-10-02T19:07:00.995332161Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:00.996078 env[1146]: time="2023-10-02T19:07:00.995789629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:00.996078 env[1146]: time="2023-10-02T19:07:00.995857931Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:00.996078 env[1146]: time="2023-10-02T19:07:00.995951150Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/387b930df19ac738938854866231e91ea62f3da35006ad4fbe4467f5393bb5e4 pid=1841 runtime=io.containerd.runc.v2 Oct 2 19:07:01.008610 systemd[1]: Started cri-containerd-cca3ff099bec8c95f77b7424aba25d8fa6ffe6bf0409b227e1928b50ed3d3389.scope. Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.018000 audit: BPF prog-id=64 op=LOAD Oct 2 19:07:01.021314 systemd[1]: Started cri-containerd-387b930df19ac738938854866231e91ea62f3da35006ad4fbe4467f5393bb5e4.scope. Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1823 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363613366663039396265633863393566373762373432346162613235 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1823 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363613366663039396265633863393566373762373432346162613235 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.021000 audit: BPF prog-id=65 op=LOAD Oct 2 19:07:01.021000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002185e0 items=0 ppid=1823 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363613366663039396265633863393566373762373432346162613235 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit: BPF prog-id=66 op=LOAD Oct 2 19:07:01.022000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218628 items=0 ppid=1823 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363613366663039396265633863393566373762373432346162613235 Oct 2 19:07:01.022000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:07:01.022000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.022000 audit: BPF prog-id=67 op=LOAD Oct 2 19:07:01.022000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218a38 items=0 ppid=1823 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363613366663039396265633863393566373762373432346162613235 Oct 2 19:07:01.024427 env[1146]: time="2023-10-02T19:07:01.024382060Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:01.024427 env[1146]: time="2023-10-02T19:07:01.024411356Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:01.024516 env[1146]: time="2023-10-02T19:07:01.024433392Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:01.024621 env[1146]: time="2023-10-02T19:07:01.024602149Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e0c5f02e989bc25ab566d6aa2985eb435bec88871deddbc663c99a974b0f265 pid=1868 runtime=io.containerd.runc.v2 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.033000 audit: BPF prog-id=68 op=LOAD Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1841 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338376239333064663139616337333839333838353438363632333165 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1841 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338376239333064663139616337333839333838353438363632333165 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit: BPF prog-id=69 op=LOAD Oct 2 19:07:01.034000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000300c20 items=0 ppid=1841 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338376239333064663139616337333839333838353438363632333165 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit: BPF prog-id=70 op=LOAD Oct 2 19:07:01.034000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000300c68 items=0 ppid=1841 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338376239333064663139616337333839333838353438363632333165 Oct 2 19:07:01.034000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:07:01.034000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.034000 audit: BPF prog-id=71 op=LOAD Oct 2 19:07:01.034000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000301078 items=0 ppid=1841 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338376239333064663139616337333839333838353438363632333165 Oct 2 19:07:01.042243 systemd[1]: Started cri-containerd-2e0c5f02e989bc25ab566d6aa2985eb435bec88871deddbc663c99a974b0f265.scope. Oct 2 19:07:01.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit: BPF prog-id=72 op=LOAD Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1868 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306335663032653938396263323561623536366436616132393835 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1868 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306335663032653938396263323561623536366436616132393835 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit: BPF prog-id=73 op=LOAD Oct 2 19:07:01.052000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000370c20 items=0 ppid=1868 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306335663032653938396263323561623536366436616132393835 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit: BPF prog-id=74 op=LOAD Oct 2 19:07:01.052000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000370c68 items=0 ppid=1868 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306335663032653938396263323561623536366436616132393835 Oct 2 19:07:01.052000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:07:01.052000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.052000 audit: BPF prog-id=75 op=LOAD Oct 2 19:07:01.052000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000371078 items=0 ppid=1868 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306335663032653938396263323561623536366436616132393835 Oct 2 19:07:01.075649 env[1146]: time="2023-10-02T19:07:01.075624550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:24fef87020af50fba838138f9686fc61,Namespace:kube-system,Attempt:0,} returns sandbox id \"cca3ff099bec8c95f77b7424aba25d8fa6ffe6bf0409b227e1928b50ed3d3389\"" Oct 2 19:07:01.077693 env[1146]: time="2023-10-02T19:07:01.077677367Z" level=info msg="CreateContainer within sandbox \"cca3ff099bec8c95f77b7424aba25d8fa6ffe6bf0409b227e1928b50ed3d3389\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:07:01.084540 env[1146]: time="2023-10-02T19:07:01.084518622Z" level=info msg="CreateContainer within sandbox \"cca3ff099bec8c95f77b7424aba25d8fa6ffe6bf0409b227e1928b50ed3d3389\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ff60a2dae8cf3969dd4be1bc53c7365a5ff43a57174b173c79772b60863c8d44\"" Oct 2 19:07:01.086056 env[1146]: time="2023-10-02T19:07:01.086043271Z" level=info msg="StartContainer for \"ff60a2dae8cf3969dd4be1bc53c7365a5ff43a57174b173c79772b60863c8d44\"" Oct 2 19:07:01.087385 env[1146]: time="2023-10-02T19:07:01.087369869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:80b8b8966aa7d1c422f3be2bfac9c13f,Namespace:kube-system,Attempt:0,} returns sandbox id \"2e0c5f02e989bc25ab566d6aa2985eb435bec88871deddbc663c99a974b0f265\"" Oct 2 19:07:01.090038 env[1146]: time="2023-10-02T19:07:01.090005271Z" level=info msg="CreateContainer within sandbox \"2e0c5f02e989bc25ab566d6aa2985eb435bec88871deddbc663c99a974b0f265\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:07:01.090931 env[1146]: time="2023-10-02T19:07:01.090917167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:41d85f8b246864b883456a06817cf1d0,Namespace:kube-system,Attempt:0,} returns sandbox id \"387b930df19ac738938854866231e91ea62f3da35006ad4fbe4467f5393bb5e4\"" Oct 2 19:07:01.092305 env[1146]: time="2023-10-02T19:07:01.092287525Z" level=info msg="CreateContainer within sandbox \"387b930df19ac738938854866231e91ea62f3da35006ad4fbe4467f5393bb5e4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:07:01.097523 env[1146]: time="2023-10-02T19:07:01.097503631Z" level=info msg="CreateContainer within sandbox \"2e0c5f02e989bc25ab566d6aa2985eb435bec88871deddbc663c99a974b0f265\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1ca44818d315f4542f2ceddfbe4f038fd899cf12ddcfbfe08f844f17e94ca93a\"" Oct 2 19:07:01.097768 env[1146]: time="2023-10-02T19:07:01.097744955Z" level=info msg="StartContainer for \"1ca44818d315f4542f2ceddfbe4f038fd899cf12ddcfbfe08f844f17e94ca93a\"" Oct 2 19:07:01.101538 env[1146]: time="2023-10-02T19:07:01.101520218Z" level=info msg="CreateContainer within sandbox \"387b930df19ac738938854866231e91ea62f3da35006ad4fbe4467f5393bb5e4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"a2ad68d5eb6334adb7e88e79e9ad0894e642d5e4ff1252aed4a96717fdbefaa4\"" Oct 2 19:07:01.101769 env[1146]: time="2023-10-02T19:07:01.101745741Z" level=info msg="StartContainer for \"a2ad68d5eb6334adb7e88e79e9ad0894e642d5e4ff1252aed4a96717fdbefaa4\"" Oct 2 19:07:01.105294 systemd[1]: Started cri-containerd-ff60a2dae8cf3969dd4be1bc53c7365a5ff43a57174b173c79772b60863c8d44.scope. Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.118000 audit: BPF prog-id=76 op=LOAD Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=1823 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363061326461653863663339363964643462653162633533633733 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=1823 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363061326461653863663339363964643462653162633533633733 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit: BPF prog-id=77 op=LOAD Oct 2 19:07:01.119000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c0003da0a0 items=0 ppid=1823 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363061326461653863663339363964643462653162633533633733 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit: BPF prog-id=78 op=LOAD Oct 2 19:07:01.119000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c0003da0e8 items=0 ppid=1823 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363061326461653863663339363964643462653162633533633733 Oct 2 19:07:01.119000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:07:01.119000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { perfmon } for pid=1946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit[1946]: AVC avc: denied { bpf } for pid=1946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.119000 audit: BPF prog-id=79 op=LOAD Oct 2 19:07:01.119000 audit[1946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0003da4f8 items=0 ppid=1823 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666363061326461653863663339363964643462653162633533633733 Oct 2 19:07:01.126525 systemd[1]: Started cri-containerd-a2ad68d5eb6334adb7e88e79e9ad0894e642d5e4ff1252aed4a96717fdbefaa4.scope. Oct 2 19:07:01.129503 systemd[1]: Started cri-containerd-1ca44818d315f4542f2ceddfbe4f038fd899cf12ddcfbfe08f844f17e94ca93a.scope. Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.140000 audit: BPF prog-id=80 op=LOAD Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023dc48 a2=10 a3=1c items=0 ppid=1868 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613434383138643331356634353432663263656464666265346630 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00023d6b0 a2=3c a3=8 items=0 ppid=1868 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613434383138643331356634353432663263656464666265346630 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit: BPF prog-id=81 op=LOAD Oct 2 19:07:01.141000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023d9d8 a2=78 a3=c0003bc0a0 items=0 ppid=1868 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613434383138643331356634353432663263656464666265346630 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit: BPF prog-id=82 op=LOAD Oct 2 19:07:01.141000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00023d770 a2=78 a3=c0003bc0e8 items=0 ppid=1868 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613434383138643331356634353432663263656464666265346630 Oct 2 19:07:01.141000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:07:01.141000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.141000 audit: BPF prog-id=83 op=LOAD Oct 2 19:07:01.141000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023dc30 a2=78 a3=c0003bc4f8 items=0 ppid=1868 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613434383138643331356634353432663263656464666265346630 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit: BPF prog-id=84 op=LOAD Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1841 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616436386435656236333334616462376538386537396539616430 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1841 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616436386435656236333334616462376538386537396539616430 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit: BPF prog-id=85 op=LOAD Oct 2 19:07:01.143000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000364120 items=0 ppid=1841 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616436386435656236333334616462376538386537396539616430 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit: BPF prog-id=86 op=LOAD Oct 2 19:07:01.143000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000364168 items=0 ppid=1841 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616436386435656236333334616462376538386537396539616430 Oct 2 19:07:01.143000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:07:01.143000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:01.143000 audit: BPF prog-id=87 op=LOAD Oct 2 19:07:01.143000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000364578 items=0 ppid=1841 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:01.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132616436386435656236333334616462376538386537396539616430 Oct 2 19:07:01.160202 env[1146]: time="2023-10-02T19:07:01.160174258Z" level=info msg="StartContainer for \"ff60a2dae8cf3969dd4be1bc53c7365a5ff43a57174b173c79772b60863c8d44\" returns successfully" Oct 2 19:07:01.175684 env[1146]: time="2023-10-02T19:07:01.175601211Z" level=info msg="StartContainer for \"1ca44818d315f4542f2ceddfbe4f038fd899cf12ddcfbfe08f844f17e94ca93a\" returns successfully" Oct 2 19:07:01.185265 env[1146]: time="2023-10-02T19:07:01.185241682Z" level=info msg="StartContainer for \"a2ad68d5eb6334adb7e88e79e9ad0894e642d5e4ff1252aed4a96717fdbefaa4\" returns successfully" Oct 2 19:07:01.314408 kubelet[1785]: W1002 19:07:01.314338 1785 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.107:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:01.314408 kubelet[1785]: E1002 19:07:01.314393 1785 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.107:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:01.378145 kubelet[1785]: W1002 19:07:01.378074 1785 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.107:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:01.378145 kubelet[1785]: E1002 19:07:01.378124 1785 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.107:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:01.397518 kubelet[1785]: W1002 19:07:01.397455 1785 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.107:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:01.397518 kubelet[1785]: E1002 19:07:01.397495 1785 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.107:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:01.421930 kubelet[1785]: W1002 19:07:01.421875 1785 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.107:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:01.421930 kubelet[1785]: E1002 19:07:01.421913 1785 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.107:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.107:6443: connect: connection refused Oct 2 19:07:01.438483 kubelet[1785]: E1002 19:07:01.438459 1785 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.107:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.107:6443: connect: connection refused" interval="1.6s" Oct 2 19:07:01.542110 kubelet[1785]: I1002 19:07:01.541922 1785 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:07:01.542110 kubelet[1785]: E1002 19:07:01.542095 1785 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.107:6443/api/v1/nodes\": dial tcp 139.178.70.107:6443: connect: connection refused" node="localhost" Oct 2 19:07:02.006000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:02.006000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000caa000 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:07:02.006000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:02.006000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:02.006000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ca0040 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:07:02.006000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:02.667000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:02.667000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003a66000 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:07:02.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:07:02.667000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:02.667000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003e842c0 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:07:02.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:07:02.668000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:02.668000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003a661b0 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:07:02.668000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:07:02.674000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:02.674000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c003b2a870 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:07:02.674000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:07:02.683000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:02.683000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c005d414c0 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:07:02.683000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:07:02.683000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:02.683000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c003b8a8a0 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:07:02.683000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:07:03.042171 kubelet[1785]: E1002 19:07:03.042151 1785 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Oct 2 19:07:03.081368 kubelet[1785]: E1002 19:07:03.081337 1785 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Oct 2 19:07:03.143155 kubelet[1785]: I1002 19:07:03.143135 1785 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:07:03.150529 kubelet[1785]: I1002 19:07:03.150496 1785 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Oct 2 19:07:03.158521 kubelet[1785]: E1002 19:07:03.158494 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:03.258970 kubelet[1785]: E1002 19:07:03.258927 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:03.359431 kubelet[1785]: E1002 19:07:03.359317 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:03.459677 kubelet[1785]: E1002 19:07:03.459644 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:03.560340 kubelet[1785]: E1002 19:07:03.560310 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:03.660926 kubelet[1785]: E1002 19:07:03.660845 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:03.761410 kubelet[1785]: E1002 19:07:03.761382 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:03.861856 kubelet[1785]: E1002 19:07:03.861833 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:03.962540 kubelet[1785]: E1002 19:07:03.962478 1785 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Oct 2 19:07:04.033125 kubelet[1785]: I1002 19:07:04.033094 1785 apiserver.go:52] "Watching apiserver" Oct 2 19:07:04.036075 kubelet[1785]: I1002 19:07:04.036061 1785 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:07:04.057829 kubelet[1785]: I1002 19:07:04.057807 1785 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:07:05.442087 systemd[1]: Reloading. Oct 2 19:07:05.514190 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2023-10-02T19:07:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:05.514486 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2023-10-02T19:07:05Z" level=info msg="torcx already run" Oct 2 19:07:05.568808 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:05.568822 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:05.580229 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:05.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.638300 kernel: kauditd_printk_skb: 583 callbacks suppressed Oct 2 19:07:05.638384 kernel: audit: type=1400 audit(1696273625.636:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.643011 kernel: audit: type=1400 audit(1696273625.636:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.643042 kernel: audit: type=1400 audit(1696273625.637:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.647778 kernel: audit: type=1400 audit(1696273625.637:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.647816 kernel: audit: type=1400 audit(1696273625.637:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.652647 kernel: audit: type=1400 audit(1696273625.637:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.652680 kernel: audit: type=1400 audit(1696273625.637:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.657468 kernel: audit: type=1400 audit(1696273625.637:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.657494 kernel: audit: type=1400 audit(1696273625.637:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659824 kernel: audit: type=1400 audit(1696273625.645:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit: BPF prog-id=88 op=LOAD Oct 2 19:07:05.645000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit: BPF prog-id=89 op=LOAD Oct 2 19:07:05.649000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit: BPF prog-id=90 op=LOAD Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.661000 audit: BPF prog-id=91 op=LOAD Oct 2 19:07:05.661000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:07:05.662000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit: BPF prog-id=92 op=LOAD Oct 2 19:07:05.662000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit: BPF prog-id=93 op=LOAD Oct 2 19:07:05.663000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit: BPF prog-id=94 op=LOAD Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit: BPF prog-id=95 op=LOAD Oct 2 19:07:05.664000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:07:05.664000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.664000 audit: BPF prog-id=96 op=LOAD Oct 2 19:07:05.664000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.665000 audit: BPF prog-id=97 op=LOAD Oct 2 19:07:05.665000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.666000 audit: BPF prog-id=98 op=LOAD Oct 2 19:07:05.666000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.667000 audit: BPF prog-id=99 op=LOAD Oct 2 19:07:05.667000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.668000 audit: BPF prog-id=100 op=LOAD Oct 2 19:07:05.668000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.669000 audit: BPF prog-id=101 op=LOAD Oct 2 19:07:05.669000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit: BPF prog-id=102 op=LOAD Oct 2 19:07:05.671000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit: BPF prog-id=103 op=LOAD Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit: BPF prog-id=104 op=LOAD Oct 2 19:07:05.672000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:07:05.672000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.672000 audit: BPF prog-id=105 op=LOAD Oct 2 19:07:05.672000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.673000 audit: BPF prog-id=106 op=LOAD Oct 2 19:07:05.673000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:07:05.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit: BPF prog-id=107 op=LOAD Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.674000 audit: BPF prog-id=108 op=LOAD Oct 2 19:07:05.674000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:07:05.674000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:07:05.682282 systemd[1]: Stopping kubelet.service... Oct 2 19:07:05.697028 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:07:05.697296 systemd[1]: Stopped kubelet.service. Oct 2 19:07:05.699672 systemd[1]: Started kubelet.service. Oct 2 19:07:05.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:05.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:05.738260 kubelet[2130]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:07:05.738260 kubelet[2130]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:07:05.738260 kubelet[2130]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:07:05.738491 kubelet[2130]: I1002 19:07:05.738279 2130 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:07:05.747773 kubelet[2130]: I1002 19:07:05.747743 2130 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:07:05.747773 kubelet[2130]: I1002 19:07:05.747768 2130 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:07:05.747953 kubelet[2130]: I1002 19:07:05.747940 2130 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:07:05.749115 kubelet[2130]: I1002 19:07:05.749100 2130 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:07:05.751583 kubelet[2130]: I1002 19:07:05.751559 2130 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:07:05.751682 kubelet[2130]: I1002 19:07:05.751671 2130 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:07:05.751727 kubelet[2130]: I1002 19:07:05.751720 2130 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:07:05.751822 kubelet[2130]: I1002 19:07:05.751733 2130 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:07:05.751822 kubelet[2130]: I1002 19:07:05.751743 2130 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:07:05.751822 kubelet[2130]: I1002 19:07:05.751767 2130 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:07:05.752960 kubelet[2130]: I1002 19:07:05.752946 2130 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:07:05.754556 kubelet[2130]: I1002 19:07:05.754540 2130 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:07:05.754556 kubelet[2130]: I1002 19:07:05.754557 2130 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:07:05.754625 kubelet[2130]: I1002 19:07:05.754571 2130 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:07:05.754625 kubelet[2130]: I1002 19:07:05.754589 2130 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:07:05.757905 kubelet[2130]: I1002 19:07:05.757889 2130 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:07:05.758164 kubelet[2130]: I1002 19:07:05.758151 2130 server.go:1168] "Started kubelet" Oct 2 19:07:05.758000 audit[2130]: AVC avc: denied { mac_admin } for pid=2130 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.758000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:05.758000 audit[2130]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d7c270 a1=c000cb35a8 a2=c000d7c240 a3=25 items=0 ppid=1 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:05.758000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:05.758000 audit[2130]: AVC avc: denied { mac_admin } for pid=2130 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.758000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:05.758000 audit[2130]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cd08a0 a1=c000cb35c0 a2=c000d7c300 a3=25 items=0 ppid=1 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:05.758000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:05.762387 kubelet[2130]: I1002 19:07:05.759254 2130 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:07:05.762387 kubelet[2130]: I1002 19:07:05.759274 2130 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:07:05.762387 kubelet[2130]: I1002 19:07:05.759286 2130 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:07:05.762387 kubelet[2130]: I1002 19:07:05.761159 2130 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:07:05.762387 kubelet[2130]: I1002 19:07:05.761534 2130 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:07:05.762610 kubelet[2130]: I1002 19:07:05.762598 2130 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:07:05.764821 kubelet[2130]: E1002 19:07:05.763406 2130 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:07:05.764821 kubelet[2130]: E1002 19:07:05.763425 2130 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:07:05.769298 kubelet[2130]: I1002 19:07:05.769282 2130 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:07:05.773654 kubelet[2130]: I1002 19:07:05.773237 2130 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:07:05.777304 kubelet[2130]: I1002 19:07:05.776438 2130 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:07:05.777304 kubelet[2130]: I1002 19:07:05.776937 2130 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:07:05.777304 kubelet[2130]: I1002 19:07:05.776948 2130 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:07:05.777304 kubelet[2130]: I1002 19:07:05.776958 2130 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:07:05.777304 kubelet[2130]: E1002 19:07:05.776982 2130 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:07:05.817968 kubelet[2130]: I1002 19:07:05.817950 2130 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:07:05.817968 kubelet[2130]: I1002 19:07:05.817964 2130 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:07:05.817968 kubelet[2130]: I1002 19:07:05.817975 2130 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:07:05.818082 kubelet[2130]: I1002 19:07:05.818071 2130 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:07:05.818082 kubelet[2130]: I1002 19:07:05.818080 2130 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:07:05.818130 kubelet[2130]: I1002 19:07:05.818083 2130 policy_none.go:49] "None policy: Start" Oct 2 19:07:05.818397 kubelet[2130]: I1002 19:07:05.818384 2130 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:07:05.818423 kubelet[2130]: I1002 19:07:05.818399 2130 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:07:05.818480 kubelet[2130]: I1002 19:07:05.818469 2130 state_mem.go:75] "Updated machine memory state" Oct 2 19:07:05.823000 audit[2130]: AVC avc: denied { mac_admin } for pid=2130 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:05.823000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:05.823000 audit[2130]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001342090 a1=c001310ca8 a2=c001342060 a3=25 items=0 ppid=1 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:05.823000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:05.825862 kubelet[2130]: I1002 19:07:05.824404 2130 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:07:05.825862 kubelet[2130]: I1002 19:07:05.824444 2130 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:07:05.825862 kubelet[2130]: I1002 19:07:05.824564 2130 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:07:05.871708 kubelet[2130]: I1002 19:07:05.871119 2130 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:07:05.877335 kubelet[2130]: I1002 19:07:05.877308 2130 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Oct 2 19:07:05.877434 kubelet[2130]: I1002 19:07:05.877376 2130 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Oct 2 19:07:05.879037 kubelet[2130]: I1002 19:07:05.877571 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:05.879037 kubelet[2130]: I1002 19:07:05.877627 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:05.879037 kubelet[2130]: I1002 19:07:05.877658 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:05.883120 kubelet[2130]: E1002 19:07:05.883098 2130 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 2 19:07:06.074805 kubelet[2130]: I1002 19:07:06.074776 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/41d85f8b246864b883456a06817cf1d0-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"41d85f8b246864b883456a06817cf1d0\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:07:06.074931 kubelet[2130]: I1002 19:07:06.074821 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/41d85f8b246864b883456a06817cf1d0-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"41d85f8b246864b883456a06817cf1d0\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:07:06.074931 kubelet[2130]: I1002 19:07:06.074845 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/41d85f8b246864b883456a06817cf1d0-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"41d85f8b246864b883456a06817cf1d0\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:07:06.074931 kubelet[2130]: I1002 19:07:06.074859 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:06.074931 kubelet[2130]: I1002 19:07:06.074880 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:06.074931 kubelet[2130]: I1002 19:07:06.074892 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/24fef87020af50fba838138f9686fc61-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"24fef87020af50fba838138f9686fc61\") " pod="kube-system/kube-scheduler-localhost" Oct 2 19:07:06.075036 kubelet[2130]: I1002 19:07:06.074902 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:06.075036 kubelet[2130]: I1002 19:07:06.074914 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:06.075036 kubelet[2130]: I1002 19:07:06.074930 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:07:06.757883 kubelet[2130]: I1002 19:07:06.757851 2130 apiserver.go:52] "Watching apiserver" Oct 2 19:07:06.821096 kubelet[2130]: E1002 19:07:06.821078 2130 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 2 19:07:06.830710 kubelet[2130]: I1002 19:07:06.830690 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.829842455 podCreationTimestamp="2023-10-02 19:07:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:06.820969958 +0000 UTC m=+1.115407806" watchObservedRunningTime="2023-10-02 19:07:06.829842455 +0000 UTC m=+1.124280296" Oct 2 19:07:06.840588 kubelet[2130]: I1002 19:07:06.840569 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.840543419 podCreationTimestamp="2023-10-02 19:07:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:06.830922014 +0000 UTC m=+1.125359851" watchObservedRunningTime="2023-10-02 19:07:06.840543419 +0000 UTC m=+1.134981261" Oct 2 19:07:06.865637 kubelet[2130]: I1002 19:07:06.865619 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.8655954719999999 podCreationTimestamp="2023-10-02 19:07:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:06.846443881 +0000 UTC m=+1.140881725" watchObservedRunningTime="2023-10-02 19:07:06.865595472 +0000 UTC m=+1.160033320" Oct 2 19:07:06.873572 kubelet[2130]: I1002 19:07:06.873552 2130 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:07:06.878349 kubelet[2130]: I1002 19:07:06.878331 2130 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:07:08.152000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:08.152000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ec6e40 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:07:08.152000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:08.155000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:08.155000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f36880 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:07:08.155000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:08.155000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:08.155000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f368c0 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:07:08.155000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:08.155000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:08.155000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f36900 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:07:08.155000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:09.518000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6854 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:07:09.518000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010e1c00 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:07:09.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:10.383361 sudo[1347]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:10.382000 audit[1347]: USER_END pid=1347 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.383000 audit[1347]: CRED_DISP pid=1347 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.395303 sshd[1344]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:10.398000 audit[1344]: USER_END pid=1344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:07:10.398000 audit[1344]: CRED_DISP pid=1344 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:07:10.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.107:22-86.109.11.97:60648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.405585 systemd[1]: sshd@6-139.178.70.107:22-86.109.11.97:60648.service: Deactivated successfully. Oct 2 19:07:10.406270 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:07:10.406401 systemd[1]: session-9.scope: Consumed 2.452s CPU time. Oct 2 19:07:10.407172 systemd-logind[1135]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:07:10.407921 systemd-logind[1135]: Removed session 9. Oct 2 19:07:21.135714 kubelet[2130]: I1002 19:07:21.135696 2130 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:07:21.136321 env[1146]: time="2023-10-02T19:07:21.136296346Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:07:21.136601 kubelet[2130]: I1002 19:07:21.136582 2130 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:07:21.147783 kubelet[2130]: I1002 19:07:21.147760 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:21.151100 systemd[1]: Created slice kubepods-besteffort-podf1e7b25b_f5d3_419e_97e4_a0912db945b6.slice. Oct 2 19:07:21.171833 kubelet[2130]: I1002 19:07:21.171814 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f1e7b25b-f5d3-419e-97e4-a0912db945b6-xtables-lock\") pod \"kube-proxy-2j87x\" (UID: \"f1e7b25b-f5d3-419e-97e4-a0912db945b6\") " pod="kube-system/kube-proxy-2j87x" Oct 2 19:07:21.172038 kubelet[2130]: I1002 19:07:21.172027 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f1e7b25b-f5d3-419e-97e4-a0912db945b6-kube-proxy\") pod \"kube-proxy-2j87x\" (UID: \"f1e7b25b-f5d3-419e-97e4-a0912db945b6\") " pod="kube-system/kube-proxy-2j87x" Oct 2 19:07:21.172120 kubelet[2130]: I1002 19:07:21.172111 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f1e7b25b-f5d3-419e-97e4-a0912db945b6-lib-modules\") pod \"kube-proxy-2j87x\" (UID: \"f1e7b25b-f5d3-419e-97e4-a0912db945b6\") " pod="kube-system/kube-proxy-2j87x" Oct 2 19:07:21.172193 kubelet[2130]: I1002 19:07:21.172185 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pcc4v\" (UniqueName: \"kubernetes.io/projected/f1e7b25b-f5d3-419e-97e4-a0912db945b6-kube-api-access-pcc4v\") pod \"kube-proxy-2j87x\" (UID: \"f1e7b25b-f5d3-419e-97e4-a0912db945b6\") " pod="kube-system/kube-proxy-2j87x" Oct 2 19:07:21.203749 kubelet[2130]: I1002 19:07:21.203730 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:21.206963 systemd[1]: Created slice kubepods-besteffort-pode50d0587_29e0_48a3_9fd2_21e1cba72a2b.slice. Oct 2 19:07:21.273258 kubelet[2130]: I1002 19:07:21.273238 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e50d0587-29e0-48a3-9fd2-21e1cba72a2b-var-lib-calico\") pod \"tigera-operator-59c686f986-7lcwz\" (UID: \"e50d0587-29e0-48a3-9fd2-21e1cba72a2b\") " pod="tigera-operator/tigera-operator-59c686f986-7lcwz" Oct 2 19:07:21.273811 kubelet[2130]: I1002 19:07:21.273773 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kwnlk\" (UniqueName: \"kubernetes.io/projected/e50d0587-29e0-48a3-9fd2-21e1cba72a2b-kube-api-access-kwnlk\") pod \"tigera-operator-59c686f986-7lcwz\" (UID: \"e50d0587-29e0-48a3-9fd2-21e1cba72a2b\") " pod="tigera-operator/tigera-operator-59c686f986-7lcwz" Oct 2 19:07:21.460290 env[1146]: time="2023-10-02T19:07:21.460202856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2j87x,Uid:f1e7b25b-f5d3-419e-97e4-a0912db945b6,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:21.508980 env[1146]: time="2023-10-02T19:07:21.508786828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-7lcwz,Uid:e50d0587-29e0-48a3-9fd2-21e1cba72a2b,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:07:21.532861 env[1146]: time="2023-10-02T19:07:21.532602483Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:21.532861 env[1146]: time="2023-10-02T19:07:21.532639072Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:21.532861 env[1146]: time="2023-10-02T19:07:21.532648754Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:21.533291 env[1146]: time="2023-10-02T19:07:21.533246095Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ebceaee3e73fedb3b8b4cf3c9a686dc0af865c587b37a1668ef8c3c5cb1253a6 pid=2212 runtime=io.containerd.runc.v2 Oct 2 19:07:21.545773 systemd[1]: Started cri-containerd-ebceaee3e73fedb3b8b4cf3c9a686dc0af865c587b37a1668ef8c3c5cb1253a6.scope. Oct 2 19:07:21.563725 kernel: kauditd_printk_skb: 268 callbacks suppressed Oct 2 19:07:21.563809 kernel: audit: type=1400 audit(1696273641.554:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.568740 kernel: audit: type=1400 audit(1696273641.555:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.568773 kernel: audit: type=1400 audit(1696273641.555:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.573907 kernel: audit: type=1400 audit(1696273641.555:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.573943 kernel: audit: type=1400 audit(1696273641.555:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.580020 kernel: audit: type=1400 audit(1696273641.555:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.580048 kernel: audit: type=1400 audit(1696273641.555:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.583131 kernel: audit: type=1400 audit(1696273641.555:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.589145 env[1146]: time="2023-10-02T19:07:21.588230854Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:21.589145 env[1146]: time="2023-10-02T19:07:21.588251352Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:21.589145 env[1146]: time="2023-10-02T19:07:21.588258387Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:21.589145 env[1146]: time="2023-10-02T19:07:21.588313444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/196b6a22b0010d8407c8d70b6fc779b38520214a83684d495fe1188277be7825 pid=2253 runtime=io.containerd.runc.v2 Oct 2 19:07:21.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.591828 kernel: audit: type=1400 audit(1696273641.555:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.591860 kernel: audit: type=1400 audit(1696273641.555:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit: BPF prog-id=109 op=LOAD Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2212 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636561656533653733666564623362386234636633633961363836 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2212 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636561656533653733666564623362386234636633633961363836 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.555000 audit: BPF prog-id=110 op=LOAD Oct 2 19:07:21.555000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a86f0 items=0 ppid=2212 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636561656533653733666564623362386234636633633961363836 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.562000 audit: BPF prog-id=111 op=LOAD Oct 2 19:07:21.562000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a8738 items=0 ppid=2212 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636561656533653733666564623362386234636633633961363836 Oct 2 19:07:21.562000 audit: BPF prog-id=111 op=UNLOAD Oct 2 19:07:21.563000 audit: BPF prog-id=110 op=UNLOAD Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.563000 audit: BPF prog-id=112 op=LOAD Oct 2 19:07:21.563000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a8b48 items=0 ppid=2212 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562636561656533653733666564623362386234636633633961363836 Oct 2 19:07:21.593231 env[1146]: time="2023-10-02T19:07:21.593201708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2j87x,Uid:f1e7b25b-f5d3-419e-97e4-a0912db945b6,Namespace:kube-system,Attempt:0,} returns sandbox id \"ebceaee3e73fedb3b8b4cf3c9a686dc0af865c587b37a1668ef8c3c5cb1253a6\"" Oct 2 19:07:21.597010 env[1146]: time="2023-10-02T19:07:21.596882958Z" level=info msg="CreateContainer within sandbox \"ebceaee3e73fedb3b8b4cf3c9a686dc0af865c587b37a1668ef8c3c5cb1253a6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:07:21.608588 systemd[1]: Started cri-containerd-196b6a22b0010d8407c8d70b6fc779b38520214a83684d495fe1188277be7825.scope. Oct 2 19:07:21.618055 env[1146]: time="2023-10-02T19:07:21.618026714Z" level=info msg="CreateContainer within sandbox \"ebceaee3e73fedb3b8b4cf3c9a686dc0af865c587b37a1668ef8c3c5cb1253a6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f81df6abae4fdc7f9a40035f4ac405374ff67558c2cb959b5dd54f887aa0b50a\"" Oct 2 19:07:21.618824 env[1146]: time="2023-10-02T19:07:21.618787203Z" level=info msg="StartContainer for \"f81df6abae4fdc7f9a40035f4ac405374ff67558c2cb959b5dd54f887aa0b50a\"" Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.620000 audit: BPF prog-id=113 op=LOAD Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2253 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366236613232623030313064383430376338643730623666633737 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2253 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366236613232623030313064383430376338643730623666633737 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.621000 audit: BPF prog-id=114 op=LOAD Oct 2 19:07:21.621000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000364780 items=0 ppid=2253 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366236613232623030313064383430376338643730623666633737 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.622000 audit: BPF prog-id=115 op=LOAD Oct 2 19:07:21.622000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003647c8 items=0 ppid=2253 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366236613232623030313064383430376338643730623666633737 Oct 2 19:07:21.623000 audit: BPF prog-id=115 op=UNLOAD Oct 2 19:07:21.623000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.623000 audit: BPF prog-id=116 op=LOAD Oct 2 19:07:21.623000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000364bd8 items=0 ppid=2253 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139366236613232623030313064383430376338643730623666633737 Oct 2 19:07:21.634808 systemd[1]: Started cri-containerd-f81df6abae4fdc7f9a40035f4ac405374ff67558c2cb959b5dd54f887aa0b50a.scope. Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2212 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638316466366162616534666463376639613430303335663461633430 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit: BPF prog-id=117 op=LOAD Oct 2 19:07:21.651000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b6bb0 items=0 ppid=2212 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638316466366162616534666463376639613430303335663461633430 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.651000 audit: BPF prog-id=118 op=LOAD Oct 2 19:07:21.651000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6bf8 items=0 ppid=2212 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638316466366162616534666463376639613430303335663461633430 Oct 2 19:07:21.652000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:07:21.652000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:21.652000 audit: BPF prog-id=119 op=LOAD Oct 2 19:07:21.652000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b6c88 items=0 ppid=2212 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638316466366162616534666463376639613430303335663461633430 Oct 2 19:07:21.658328 env[1146]: time="2023-10-02T19:07:21.658292739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-7lcwz,Uid:e50d0587-29e0-48a3-9fd2-21e1cba72a2b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"196b6a22b0010d8407c8d70b6fc779b38520214a83684d495fe1188277be7825\"" Oct 2 19:07:21.661303 env[1146]: time="2023-10-02T19:07:21.661090354Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:07:21.667043 env[1146]: time="2023-10-02T19:07:21.666936485Z" level=info msg="StartContainer for \"f81df6abae4fdc7f9a40035f4ac405374ff67558c2cb959b5dd54f887aa0b50a\" returns successfully" Oct 2 19:07:22.418000 audit[2341]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.418000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1db15d70 a2=0 a3=7fff1db15d5c items=0 ppid=2297 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:07:22.419000 audit[2342]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.419000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2fc88000 a2=0 a3=7fff2fc87fec items=0 ppid=2297 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:07:22.419000 audit[2343]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.419000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc238315c0 a2=0 a3=7ffc238315ac items=0 ppid=2297 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:07:22.420000 audit[2344]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.420000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe38d70b50 a2=0 a3=7ffe38d70b3c items=0 ppid=2297 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:07:22.421000 audit[2345]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.421000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd5c85170 a2=0 a3=7ffdd5c8515c items=0 ppid=2297 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:07:22.421000 audit[2346]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.421000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec7bab2b0 a2=0 a3=7ffec7bab29c items=0 ppid=2297 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:07:22.555000 audit[2347]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.555000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffff4f28af0 a2=0 a3=7ffff4f28adc items=0 ppid=2297 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:07:22.577000 audit[2349]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.577000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcf512ccb0 a2=0 a3=7ffcf512cc9c items=0 ppid=2297 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:07:22.581000 audit[2352]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.581000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc506fc2a0 a2=0 a3=7ffc506fc28c items=0 ppid=2297 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:07:22.582000 audit[2353]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.582000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc416c5b70 a2=0 a3=7ffc416c5b5c items=0 ppid=2297 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:07:22.584000 audit[2355]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.584000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd035fc9c0 a2=0 a3=7ffd035fc9ac items=0 ppid=2297 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:07:22.585000 audit[2356]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.585000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff75e23500 a2=0 a3=7fff75e234ec items=0 ppid=2297 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:07:22.587000 audit[2358]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.587000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeedf66250 a2=0 a3=7ffeedf6623c items=0 ppid=2297 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:07:22.591000 audit[2361]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.591000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe2074e20 a2=0 a3=7fffe2074e0c items=0 ppid=2297 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:07:22.592000 audit[2362]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.592000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec9090020 a2=0 a3=7ffec909000c items=0 ppid=2297 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:07:22.593000 audit[2364]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.593000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8e0aacf0 a2=0 a3=7ffd8e0aacdc items=0 ppid=2297 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:07:22.594000 audit[2365]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.594000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2c270d90 a2=0 a3=7fff2c270d7c items=0 ppid=2297 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:07:22.596000 audit[2367]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.596000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4d4234b0 a2=0 a3=7ffc4d42349c items=0 ppid=2297 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:07:22.599000 audit[2370]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.599000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8ad224c0 a2=0 a3=7fff8ad224ac items=0 ppid=2297 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:07:22.601000 audit[2375]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.601000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7d3b7b30 a2=0 a3=7ffd7d3b7b1c items=0 ppid=2297 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:07:22.602000 audit[2376]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.602000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdce39e0e0 a2=0 a3=7ffdce39e0cc items=0 ppid=2297 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:07:22.606000 audit[2378]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.606000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe766233d0 a2=0 a3=7ffe766233bc items=0 ppid=2297 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:07:22.608000 audit[2381]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.608000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff98386df0 a2=0 a3=7fff98386ddc items=0 ppid=2297 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:07:22.611000 audit[2386]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.611000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe484ab000 a2=0 a3=7ffe484aafec items=0 ppid=2297 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:07:22.612000 audit[2388]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:22.612000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffea7f21a60 a2=0 a3=7ffea7f21a4c items=0 ppid=2297 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:07:22.638000 audit[2390]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:22.638000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff19a83b70 a2=0 a3=7fff19a83b5c items=0 ppid=2297 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:22.642000 audit[2390]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:22.642000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff19a83b70 a2=0 a3=7fff19a83b5c items=0 ppid=2297 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:22.643000 audit[2396]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.643000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd09542290 a2=0 a3=7ffd0954227c items=0 ppid=2297 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:07:22.645000 audit[2398]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.645000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb5d8b2a0 a2=0 a3=7ffdb5d8b28c items=0 ppid=2297 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:07:22.647000 audit[2401]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.647000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffccbc41fd0 a2=0 a3=7ffccbc41fbc items=0 ppid=2297 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:07:22.648000 audit[2402]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.648000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed3431290 a2=0 a3=7ffed343127c items=0 ppid=2297 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:07:22.650000 audit[2404]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.650000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc57404b80 a2=0 a3=7ffc57404b6c items=0 ppid=2297 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:07:22.651000 audit[2405]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.651000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd54188020 a2=0 a3=7ffd5418800c items=0 ppid=2297 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:07:22.652000 audit[2407]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.652000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc16eeb570 a2=0 a3=7ffc16eeb55c items=0 ppid=2297 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:07:22.654000 audit[2410]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.654000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffc5654ba0 a2=0 a3=7fffc5654b8c items=0 ppid=2297 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:07:22.655000 audit[2411]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.655000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6e6686b0 a2=0 a3=7ffe6e66869c items=0 ppid=2297 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:07:22.657000 audit[2413]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.657000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5a59a220 a2=0 a3=7ffd5a59a20c items=0 ppid=2297 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:07:22.658000 audit[2414]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.658000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9cee2c60 a2=0 a3=7ffd9cee2c4c items=0 ppid=2297 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:07:22.659000 audit[2416]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.659000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe74eeab20 a2=0 a3=7ffe74eeab0c items=0 ppid=2297 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:07:22.663000 audit[2419]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.663000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdca0bde20 a2=0 a3=7ffdca0bde0c items=0 ppid=2297 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:07:22.665000 audit[2422]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.665000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb4cacd20 a2=0 a3=7fffb4cacd0c items=0 ppid=2297 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:07:22.666000 audit[2423]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.666000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffaf4312d0 a2=0 a3=7fffaf4312bc items=0 ppid=2297 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:07:22.667000 audit[2425]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.667000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffda4fd000 a2=0 a3=7fffda4fcfec items=0 ppid=2297 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:07:22.669000 audit[2428]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.669000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffaebfb690 a2=0 a3=7fffaebfb67c items=0 ppid=2297 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:07:22.672000 audit[2429]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.672000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4fd6d450 a2=0 a3=7fff4fd6d43c items=0 ppid=2297 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:07:22.674000 audit[2431]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.674000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd89c49020 a2=0 a3=7ffd89c4900c items=0 ppid=2297 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:07:22.676000 audit[2434]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.676000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd51afba10 a2=0 a3=7ffd51afb9fc items=0 ppid=2297 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:07:22.677000 audit[2435]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.677000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde3109b50 a2=0 a3=7ffde3109b3c items=0 ppid=2297 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:07:22.678000 audit[2437]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:22.678000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdfc98d4c0 a2=0 a3=7ffdfc98d4ac items=0 ppid=2297 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:07:22.680000 audit[2439]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:07:22.680000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcffc5c9d0 a2=0 a3=7ffcffc5c9bc items=0 ppid=2297 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.680000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:22.683000 audit[2439]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:07:22.683000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffcffc5c9d0 a2=0 a3=7ffcffc5c9bc items=0 ppid=2297 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:22.683000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:23.800673 env[1146]: time="2023-10-02T19:07:23.800630560Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:23.809389 env[1146]: time="2023-10-02T19:07:23.809373932Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:23.811714 env[1146]: time="2023-10-02T19:07:23.811696954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:23.814473 env[1146]: time="2023-10-02T19:07:23.814460119Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:23.814806 env[1146]: time="2023-10-02T19:07:23.814782795Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:07:23.816905 env[1146]: time="2023-10-02T19:07:23.816836413Z" level=info msg="CreateContainer within sandbox \"196b6a22b0010d8407c8d70b6fc779b38520214a83684d495fe1188277be7825\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:07:23.829011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount988098463.mount: Deactivated successfully. Oct 2 19:07:23.831326 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3903866724.mount: Deactivated successfully. Oct 2 19:07:23.832896 env[1146]: time="2023-10-02T19:07:23.832879013Z" level=info msg="CreateContainer within sandbox \"196b6a22b0010d8407c8d70b6fc779b38520214a83684d495fe1188277be7825\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"00acbe7609c2db8f44e0d1df547f820464c10f55e6fd6bd847bfab54bc0d8976\"" Oct 2 19:07:23.834176 env[1146]: time="2023-10-02T19:07:23.834161846Z" level=info msg="StartContainer for \"00acbe7609c2db8f44e0d1df547f820464c10f55e6fd6bd847bfab54bc0d8976\"" Oct 2 19:07:23.845769 systemd[1]: Started cri-containerd-00acbe7609c2db8f44e0d1df547f820464c10f55e6fd6bd847bfab54bc0d8976.scope. Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit: BPF prog-id=120 op=LOAD Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2253 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:23.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030616362653736303963326462386634346530643164663534376638 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2253 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:23.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030616362653736303963326462386634346530643164663534376638 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit: BPF prog-id=121 op=LOAD Oct 2 19:07:23.854000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003320a0 items=0 ppid=2253 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:23.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030616362653736303963326462386634346530643164663534376638 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit: BPF prog-id=122 op=LOAD Oct 2 19:07:23.854000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003320e8 items=0 ppid=2253 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:23.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030616362653736303963326462386634346530643164663534376638 Oct 2 19:07:23.854000 audit: BPF prog-id=122 op=UNLOAD Oct 2 19:07:23.854000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { perfmon } for pid=2448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit[2448]: AVC avc: denied { bpf } for pid=2448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:23.854000 audit: BPF prog-id=123 op=LOAD Oct 2 19:07:23.854000 audit[2448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003324f8 items=0 ppid=2253 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:23.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030616362653736303963326462386634346530643164663534376638 Oct 2 19:07:23.863016 env[1146]: time="2023-10-02T19:07:23.862993605Z" level=info msg="StartContainer for \"00acbe7609c2db8f44e0d1df547f820464c10f55e6fd6bd847bfab54bc0d8976\" returns successfully" Oct 2 19:07:24.840514 kubelet[2130]: I1002 19:07:24.840410 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2j87x" podStartSLOduration=3.8403857820000002 podCreationTimestamp="2023-10-02 19:07:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:21.836183184 +0000 UTC m=+16.130621026" watchObservedRunningTime="2023-10-02 19:07:24.840385782 +0000 UTC m=+19.134823625" Oct 2 19:07:25.658000 audit[2479]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:25.658000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd77a1d0e0 a2=0 a3=7ffd77a1d0cc items=0 ppid=2297 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:25.659000 audit[2479]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:25.659000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd77a1d0e0 a2=0 a3=31030 items=0 ppid=2297 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:25.665000 audit[2481]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:25.665000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffca8069d60 a2=0 a3=7ffca8069d4c items=0 ppid=2297 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:25.667000 audit[2481]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:25.667000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffca8069d60 a2=0 a3=31030 items=0 ppid=2297 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:25.878401 kubelet[2130]: I1002 19:07:25.878364 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-59c686f986-7lcwz" podStartSLOduration=2.7224295080000003 podCreationTimestamp="2023-10-02 19:07:21 +0000 UTC" firstStartedPulling="2023-10-02 19:07:21.659091546 +0000 UTC m=+15.953529385" lastFinishedPulling="2023-10-02 19:07:23.814970283 +0000 UTC m=+18.109408122" observedRunningTime="2023-10-02 19:07:24.840689324 +0000 UTC m=+19.135127166" watchObservedRunningTime="2023-10-02 19:07:25.878308245 +0000 UTC m=+20.172746088" Oct 2 19:07:25.878632 kubelet[2130]: I1002 19:07:25.878525 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:25.881626 systemd[1]: Created slice kubepods-besteffort-podede88c78_fe8e_4939_928a_7590946455ae.slice. Oct 2 19:07:25.898356 kubelet[2130]: I1002 19:07:25.898334 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ede88c78-fe8e-4939-928a-7590946455ae-tigera-ca-bundle\") pod \"calico-typha-99977c96b-hnwz6\" (UID: \"ede88c78-fe8e-4939-928a-7590946455ae\") " pod="calico-system/calico-typha-99977c96b-hnwz6" Oct 2 19:07:25.898356 kubelet[2130]: I1002 19:07:25.898359 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ede88c78-fe8e-4939-928a-7590946455ae-typha-certs\") pod \"calico-typha-99977c96b-hnwz6\" (UID: \"ede88c78-fe8e-4939-928a-7590946455ae\") " pod="calico-system/calico-typha-99977c96b-hnwz6" Oct 2 19:07:25.898482 kubelet[2130]: I1002 19:07:25.898374 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-96bnk\" (UniqueName: \"kubernetes.io/projected/ede88c78-fe8e-4939-928a-7590946455ae-kube-api-access-96bnk\") pod \"calico-typha-99977c96b-hnwz6\" (UID: \"ede88c78-fe8e-4939-928a-7590946455ae\") " pod="calico-system/calico-typha-99977c96b-hnwz6" Oct 2 19:07:25.916246 kubelet[2130]: I1002 19:07:25.916188 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:25.919885 systemd[1]: Created slice kubepods-besteffort-pod5fc969e4_9b27_409f_adaa_d0befc06d051.slice. Oct 2 19:07:25.998933 kubelet[2130]: I1002 19:07:25.998910 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5fc969e4-9b27-409f-adaa-d0befc06d051-node-certs\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.998933 kubelet[2130]: I1002 19:07:25.998937 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-cni-net-dir\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999064 kubelet[2130]: I1002 19:07:25.998951 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-flexvol-driver-host\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999064 kubelet[2130]: I1002 19:07:25.998964 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-policysync\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999064 kubelet[2130]: I1002 19:07:25.998975 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-var-run-calico\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999064 kubelet[2130]: I1002 19:07:25.998986 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-cni-log-dir\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999064 kubelet[2130]: I1002 19:07:25.998998 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gb8bc\" (UniqueName: \"kubernetes.io/projected/5fc969e4-9b27-409f-adaa-d0befc06d051-kube-api-access-gb8bc\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999157 kubelet[2130]: I1002 19:07:25.999009 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-var-lib-calico\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999157 kubelet[2130]: I1002 19:07:25.999020 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5fc969e4-9b27-409f-adaa-d0befc06d051-tigera-ca-bundle\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999157 kubelet[2130]: I1002 19:07:25.999031 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-cni-bin-dir\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999157 kubelet[2130]: I1002 19:07:25.999042 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-lib-modules\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:25.999157 kubelet[2130]: I1002 19:07:25.999053 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5fc969e4-9b27-409f-adaa-d0befc06d051-xtables-lock\") pod \"calico-node-x649m\" (UID: \"5fc969e4-9b27-409f-adaa-d0befc06d051\") " pod="calico-system/calico-node-x649m" Oct 2 19:07:26.104729 kubelet[2130]: E1002 19:07:26.104716 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.104840 kubelet[2130]: W1002 19:07:26.104830 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.104914 kubelet[2130]: E1002 19:07:26.104906 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.105066 kubelet[2130]: E1002 19:07:26.105060 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.105129 kubelet[2130]: W1002 19:07:26.105121 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.105196 kubelet[2130]: E1002 19:07:26.105181 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.105321 kubelet[2130]: E1002 19:07:26.105315 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.105370 kubelet[2130]: W1002 19:07:26.105363 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.105439 kubelet[2130]: E1002 19:07:26.105420 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.105552 kubelet[2130]: E1002 19:07:26.105540 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.105604 kubelet[2130]: W1002 19:07:26.105597 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.105655 kubelet[2130]: E1002 19:07:26.105648 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.105744 kubelet[2130]: E1002 19:07:26.105734 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.105744 kubelet[2130]: W1002 19:07:26.105741 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.105819 kubelet[2130]: E1002 19:07:26.105751 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.105888 kubelet[2130]: E1002 19:07:26.105878 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.105888 kubelet[2130]: W1002 19:07:26.105885 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.105948 kubelet[2130]: E1002 19:07:26.105897 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.105983 kubelet[2130]: E1002 19:07:26.105973 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.105983 kubelet[2130]: W1002 19:07:26.105979 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.106059 kubelet[2130]: E1002 19:07:26.105985 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.106059 kubelet[2130]: E1002 19:07:26.106050 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.106059 kubelet[2130]: W1002 19:07:26.106054 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.106122 kubelet[2130]: E1002 19:07:26.106061 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.106153 kubelet[2130]: E1002 19:07:26.106148 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.106153 kubelet[2130]: W1002 19:07:26.106152 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.106197 kubelet[2130]: E1002 19:07:26.106157 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.111734 kubelet[2130]: E1002 19:07:26.110486 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:26.111734 kubelet[2130]: W1002 19:07:26.110495 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:26.111734 kubelet[2130]: E1002 19:07:26.110505 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:26.182912 env[1146]: time="2023-10-02T19:07:26.182846169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-99977c96b-hnwz6,Uid:ede88c78-fe8e-4939-928a-7590946455ae,Namespace:calico-system,Attempt:0,}" Oct 2 19:07:26.192636 env[1146]: time="2023-10-02T19:07:26.192595937Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:26.192713 env[1146]: time="2023-10-02T19:07:26.192648390Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:26.192713 env[1146]: time="2023-10-02T19:07:26.192663778Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:26.192848 env[1146]: time="2023-10-02T19:07:26.192824583Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d30ba49d4c0196f5c47542fe214f2dbc9105173869bb16bb81ff2d8077e4d0a2 pid=2507 runtime=io.containerd.runc.v2 Oct 2 19:07:26.204110 systemd[1]: Started cri-containerd-d30ba49d4c0196f5c47542fe214f2dbc9105173869bb16bb81ff2d8077e4d0a2.scope. Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.215000 audit: BPF prog-id=124 op=LOAD Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2507 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433306261343964346330313936663563343735343266653231346632 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2507 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433306261343964346330313936663563343735343266653231346632 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit: BPF prog-id=125 op=LOAD Oct 2 19:07:26.216000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009cc40 items=0 ppid=2507 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433306261343964346330313936663563343735343266653231346632 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit: BPF prog-id=126 op=LOAD Oct 2 19:07:26.216000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009cc88 items=0 ppid=2507 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433306261343964346330313936663563343735343266653231346632 Oct 2 19:07:26.216000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:07:26.216000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.216000 audit: BPF prog-id=127 op=LOAD Oct 2 19:07:26.216000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009d098 items=0 ppid=2507 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433306261343964346330313936663563343735343266653231346632 Oct 2 19:07:26.221656 env[1146]: time="2023-10-02T19:07:26.221636612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x649m,Uid:5fc969e4-9b27-409f-adaa-d0befc06d051,Namespace:calico-system,Attempt:0,}" Oct 2 19:07:26.245448 env[1146]: time="2023-10-02T19:07:26.245421915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-99977c96b-hnwz6,Uid:ede88c78-fe8e-4939-928a-7590946455ae,Namespace:calico-system,Attempt:0,} returns sandbox id \"d30ba49d4c0196f5c47542fe214f2dbc9105173869bb16bb81ff2d8077e4d0a2\"" Oct 2 19:07:26.246540 env[1146]: time="2023-10-02T19:07:26.246527329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:07:26.380817 env[1146]: time="2023-10-02T19:07:26.380738344Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:26.380817 env[1146]: time="2023-10-02T19:07:26.380768365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:26.380817 env[1146]: time="2023-10-02T19:07:26.380775447Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:26.381111 env[1146]: time="2023-10-02T19:07:26.381085800Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53 pid=2546 runtime=io.containerd.runc.v2 Oct 2 19:07:26.390785 systemd[1]: Started cri-containerd-1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53.scope. Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.397000 audit: BPF prog-id=128 op=LOAD Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2546 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376430343738633332643631363733306435613831646532666533 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2546 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376430343738633332643631363733306435613831646532666533 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit: BPF prog-id=129 op=LOAD Oct 2 19:07:26.398000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003346f0 items=0 ppid=2546 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376430343738633332643631363733306435613831646532666533 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit: BPF prog-id=130 op=LOAD Oct 2 19:07:26.398000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000334738 items=0 ppid=2546 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376430343738633332643631363733306435613831646532666533 Oct 2 19:07:26.398000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:07:26.398000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:26.398000 audit: BPF prog-id=131 op=LOAD Oct 2 19:07:26.398000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000334b48 items=0 ppid=2546 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376430343738633332643631363733306435613831646532666533 Oct 2 19:07:26.406863 env[1146]: time="2023-10-02T19:07:26.406841214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x649m,Uid:5fc969e4-9b27-409f-adaa-d0befc06d051,Namespace:calico-system,Attempt:0,} returns sandbox id \"1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53\"" Oct 2 19:07:26.675999 kernel: kauditd_printk_skb: 483 callbacks suppressed Oct 2 19:07:26.676068 kernel: audit: type=1325 audit(1696273646.674:1104): table=filter:93 family=2 entries=16 op=nft_register_rule pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:26.674000 audit[2581]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:26.674000 audit[2581]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc6514f860 a2=0 a3=7ffc6514f84c items=0 ppid=2297 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.681551 kernel: audit: type=1300 audit(1696273646.674:1104): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc6514f860 a2=0 a3=7ffc6514f84c items=0 ppid=2297 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.681578 kernel: audit: type=1327 audit(1696273646.674:1104): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:26.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:26.683000 audit[2581]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:26.683000 audit[2581]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc6514f860 a2=0 a3=31030 items=0 ppid=2297 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.689787 kernel: audit: type=1325 audit(1696273646.683:1105): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:26.689837 kernel: audit: type=1300 audit(1696273646.683:1105): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc6514f860 a2=0 a3=31030 items=0 ppid=2297 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:26.689859 kernel: audit: type=1327 audit(1696273646.683:1105): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:26.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:27.618568 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3837080675.mount: Deactivated successfully. Oct 2 19:07:28.711276 env[1146]: time="2023-10-02T19:07:28.711247355Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:28.712664 env[1146]: time="2023-10-02T19:07:28.712649513Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:28.713748 env[1146]: time="2023-10-02T19:07:28.713737068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:28.714304 env[1146]: time="2023-10-02T19:07:28.714290110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:07:28.714859 env[1146]: time="2023-10-02T19:07:28.714847196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:07:28.716063 env[1146]: time="2023-10-02T19:07:28.716023434Z" level=info msg="CreateContainer within sandbox \"d30ba49d4c0196f5c47542fe214f2dbc9105173869bb16bb81ff2d8077e4d0a2\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:07:28.716545 env[1146]: time="2023-10-02T19:07:28.715433815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:28.720767 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount603039395.mount: Deactivated successfully. Oct 2 19:07:28.723539 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount575822338.mount: Deactivated successfully. Oct 2 19:07:28.735300 env[1146]: time="2023-10-02T19:07:28.735272209Z" level=info msg="CreateContainer within sandbox \"d30ba49d4c0196f5c47542fe214f2dbc9105173869bb16bb81ff2d8077e4d0a2\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6a747d0adc1f47e1f77fc0ad1d94c0abe8907befaa827405763e728e5e5f037a\"" Oct 2 19:07:28.736189 env[1146]: time="2023-10-02T19:07:28.735754648Z" level=info msg="StartContainer for \"6a747d0adc1f47e1f77fc0ad1d94c0abe8907befaa827405763e728e5e5f037a\"" Oct 2 19:07:28.749744 systemd[1]: Started cri-containerd-6a747d0adc1f47e1f77fc0ad1d94c0abe8907befaa827405763e728e5e5f037a.scope. Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.764461 kernel: audit: type=1400 audit(1696273648.758:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.764502 kernel: audit: type=1400 audit(1696273648.758:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.764519 kernel: audit: type=1400 audit(1696273648.758:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.769374 kernel: audit: type=1400 audit(1696273648.758:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.758000 audit: BPF prog-id=132 op=LOAD Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2507 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:28.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373437643061646331663437653166373766633061643164393463 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2507 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:28.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373437643061646331663437653166373766633061643164393463 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.759000 audit: BPF prog-id=133 op=LOAD Oct 2 19:07:28.759000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00032e0a0 items=0 ppid=2507 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:28.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373437643061646331663437653166373766633061643164393463 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.761000 audit: BPF prog-id=134 op=LOAD Oct 2 19:07:28.761000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00032e0e8 items=0 ppid=2507 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:28.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373437643061646331663437653166373766633061643164393463 Oct 2 19:07:28.763000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:07:28.763000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:28.763000 audit: BPF prog-id=135 op=LOAD Oct 2 19:07:28.763000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00032e4f8 items=0 ppid=2507 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:28.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661373437643061646331663437653166373766633061643164393463 Oct 2 19:07:28.779863 env[1146]: time="2023-10-02T19:07:28.779838095Z" level=info msg="StartContainer for \"6a747d0adc1f47e1f77fc0ad1d94c0abe8907befaa827405763e728e5e5f037a\" returns successfully" Oct 2 19:07:28.847967 kubelet[2130]: I1002 19:07:28.847942 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-99977c96b-hnwz6" podStartSLOduration=1.379631834 podCreationTimestamp="2023-10-02 19:07:25 +0000 UTC" firstStartedPulling="2023-10-02 19:07:26.2462668 +0000 UTC m=+20.540704636" lastFinishedPulling="2023-10-02 19:07:28.714554859 +0000 UTC m=+23.008992699" observedRunningTime="2023-10-02 19:07:28.846897794 +0000 UTC m=+23.141335642" watchObservedRunningTime="2023-10-02 19:07:28.847919897 +0000 UTC m=+23.142357740" Oct 2 19:07:28.861000 audit[2622]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:28.861000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff723593f0 a2=0 a3=7fff723593dc items=0 ppid=2297 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:28.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:28.861000 audit[2622]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:28.861000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fff723593f0 a2=0 a3=7fff723593dc items=0 ppid=2297 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:28.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:28.909457 kubelet[2130]: E1002 19:07:28.909435 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.909457 kubelet[2130]: W1002 19:07:28.909451 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.909576 kubelet[2130]: E1002 19:07:28.909466 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.909576 kubelet[2130]: E1002 19:07:28.909564 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.909576 kubelet[2130]: W1002 19:07:28.909569 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.909651 kubelet[2130]: E1002 19:07:28.909575 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.909673 kubelet[2130]: E1002 19:07:28.909669 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.909692 kubelet[2130]: W1002 19:07:28.909673 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.909692 kubelet[2130]: E1002 19:07:28.909679 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.909791 kubelet[2130]: E1002 19:07:28.909781 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.909791 kubelet[2130]: W1002 19:07:28.909788 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.909847 kubelet[2130]: E1002 19:07:28.909794 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.909875 kubelet[2130]: E1002 19:07:28.909866 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.909875 kubelet[2130]: W1002 19:07:28.909871 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.909914 kubelet[2130]: E1002 19:07:28.909877 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.909959 kubelet[2130]: E1002 19:07:28.909949 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.909959 kubelet[2130]: W1002 19:07:28.909957 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.910002 kubelet[2130]: E1002 19:07:28.909965 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.910067 kubelet[2130]: E1002 19:07:28.910058 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.910067 kubelet[2130]: W1002 19:07:28.910065 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.910105 kubelet[2130]: E1002 19:07:28.910070 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.910149 kubelet[2130]: E1002 19:07:28.910139 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.910149 kubelet[2130]: W1002 19:07:28.910146 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.910230 kubelet[2130]: E1002 19:07:28.910153 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.910267 kubelet[2130]: E1002 19:07:28.910257 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.910267 kubelet[2130]: W1002 19:07:28.910264 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.910313 kubelet[2130]: E1002 19:07:28.910270 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.910386 kubelet[2130]: E1002 19:07:28.910361 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.910410 kubelet[2130]: W1002 19:07:28.910387 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.910410 kubelet[2130]: E1002 19:07:28.910393 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.910466 kubelet[2130]: E1002 19:07:28.910457 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.910466 kubelet[2130]: W1002 19:07:28.910464 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.910507 kubelet[2130]: E1002 19:07:28.910469 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.910549 kubelet[2130]: E1002 19:07:28.910539 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.910549 kubelet[2130]: W1002 19:07:28.910546 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.910593 kubelet[2130]: E1002 19:07:28.910551 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.914754 kubelet[2130]: E1002 19:07:28.914726 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.914791 kubelet[2130]: W1002 19:07:28.914757 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.914791 kubelet[2130]: E1002 19:07:28.914765 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.914896 kubelet[2130]: E1002 19:07:28.914885 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.914896 kubelet[2130]: W1002 19:07:28.914892 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.914940 kubelet[2130]: E1002 19:07:28.914898 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.914989 kubelet[2130]: E1002 19:07:28.914979 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.914989 kubelet[2130]: W1002 19:07:28.914986 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915029 kubelet[2130]: E1002 19:07:28.914993 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915094 kubelet[2130]: E1002 19:07:28.915084 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915094 kubelet[2130]: W1002 19:07:28.915091 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915145 kubelet[2130]: E1002 19:07:28.915098 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915184 kubelet[2130]: E1002 19:07:28.915174 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915184 kubelet[2130]: W1002 19:07:28.915179 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915184 kubelet[2130]: E1002 19:07:28.915185 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915265 kubelet[2130]: E1002 19:07:28.915256 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915265 kubelet[2130]: W1002 19:07:28.915262 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915521 kubelet[2130]: E1002 19:07:28.915271 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915521 kubelet[2130]: E1002 19:07:28.915356 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915521 kubelet[2130]: W1002 19:07:28.915359 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915521 kubelet[2130]: E1002 19:07:28.915365 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915598 kubelet[2130]: E1002 19:07:28.915576 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915598 kubelet[2130]: W1002 19:07:28.915580 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915598 kubelet[2130]: E1002 19:07:28.915588 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915680 kubelet[2130]: E1002 19:07:28.915669 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915680 kubelet[2130]: W1002 19:07:28.915676 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915721 kubelet[2130]: E1002 19:07:28.915684 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915769 kubelet[2130]: E1002 19:07:28.915758 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915769 kubelet[2130]: W1002 19:07:28.915766 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915836 kubelet[2130]: E1002 19:07:28.915771 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915856 kubelet[2130]: E1002 19:07:28.915846 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915856 kubelet[2130]: W1002 19:07:28.915850 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915894 kubelet[2130]: E1002 19:07:28.915856 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.915949 kubelet[2130]: E1002 19:07:28.915939 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.915949 kubelet[2130]: W1002 19:07:28.915949 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.915991 kubelet[2130]: E1002 19:07:28.915961 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.916110 kubelet[2130]: E1002 19:07:28.916100 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.916110 kubelet[2130]: W1002 19:07:28.916107 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.916161 kubelet[2130]: E1002 19:07:28.916149 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.916213 kubelet[2130]: E1002 19:07:28.916203 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.916213 kubelet[2130]: W1002 19:07:28.916210 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.916309 kubelet[2130]: E1002 19:07:28.916216 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.916364 kubelet[2130]: E1002 19:07:28.916354 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.916390 kubelet[2130]: W1002 19:07:28.916367 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.916390 kubelet[2130]: E1002 19:07:28.916375 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.916451 kubelet[2130]: E1002 19:07:28.916442 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.916451 kubelet[2130]: W1002 19:07:28.916449 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.916494 kubelet[2130]: E1002 19:07:28.916454 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.916544 kubelet[2130]: E1002 19:07:28.916535 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.916544 kubelet[2130]: W1002 19:07:28.916543 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.916584 kubelet[2130]: E1002 19:07:28.916552 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:28.919451 kubelet[2130]: E1002 19:07:28.919135 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:28.919451 kubelet[2130]: W1002 19:07:28.919144 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:28.919451 kubelet[2130]: E1002 19:07:28.919164 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.916677 kubelet[2130]: E1002 19:07:29.916587 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.916677 kubelet[2130]: W1002 19:07:29.916602 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.916677 kubelet[2130]: E1002 19:07:29.916618 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.917162 kubelet[2130]: E1002 19:07:29.917085 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.917162 kubelet[2130]: W1002 19:07:29.917093 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.917162 kubelet[2130]: E1002 19:07:29.917103 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.917404 kubelet[2130]: E1002 19:07:29.917308 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.917404 kubelet[2130]: W1002 19:07:29.917315 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.917404 kubelet[2130]: E1002 19:07:29.917330 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.917608 kubelet[2130]: E1002 19:07:29.917543 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.917608 kubelet[2130]: W1002 19:07:29.917550 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.917608 kubelet[2130]: E1002 19:07:29.917559 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.917814 kubelet[2130]: E1002 19:07:29.917743 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.917814 kubelet[2130]: W1002 19:07:29.917750 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.917814 kubelet[2130]: E1002 19:07:29.917758 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.918176 kubelet[2130]: E1002 19:07:29.917960 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.918176 kubelet[2130]: W1002 19:07:29.917967 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.918176 kubelet[2130]: E1002 19:07:29.917975 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.918176 kubelet[2130]: E1002 19:07:29.918113 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.918176 kubelet[2130]: W1002 19:07:29.918119 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.918176 kubelet[2130]: E1002 19:07:29.918129 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.918448 kubelet[2130]: E1002 19:07:29.918383 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.918448 kubelet[2130]: W1002 19:07:29.918390 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.918448 kubelet[2130]: E1002 19:07:29.918399 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.918715 kubelet[2130]: E1002 19:07:29.918642 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.918715 kubelet[2130]: W1002 19:07:29.918649 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.918715 kubelet[2130]: E1002 19:07:29.918657 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.918948 kubelet[2130]: E1002 19:07:29.918878 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.918948 kubelet[2130]: W1002 19:07:29.918884 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.918948 kubelet[2130]: E1002 19:07:29.918894 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.919185 kubelet[2130]: E1002 19:07:29.919118 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.919185 kubelet[2130]: W1002 19:07:29.919124 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.919185 kubelet[2130]: E1002 19:07:29.919133 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.919358 kubelet[2130]: E1002 19:07:29.919314 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.919358 kubelet[2130]: W1002 19:07:29.919321 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.919358 kubelet[2130]: E1002 19:07:29.919329 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.921596 kubelet[2130]: E1002 19:07:29.921512 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.921596 kubelet[2130]: W1002 19:07:29.921519 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.921596 kubelet[2130]: E1002 19:07:29.921528 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.921882 kubelet[2130]: E1002 19:07:29.921741 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.921882 kubelet[2130]: W1002 19:07:29.921749 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.921882 kubelet[2130]: E1002 19:07:29.921760 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.922126 kubelet[2130]: E1002 19:07:29.922029 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.922126 kubelet[2130]: W1002 19:07:29.922036 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.922126 kubelet[2130]: E1002 19:07:29.922046 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.922340 kubelet[2130]: E1002 19:07:29.922259 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.922340 kubelet[2130]: W1002 19:07:29.922266 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.922340 kubelet[2130]: E1002 19:07:29.922282 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.922559 kubelet[2130]: E1002 19:07:29.922486 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.922559 kubelet[2130]: W1002 19:07:29.922494 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.922559 kubelet[2130]: E1002 19:07:29.922505 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.922785 kubelet[2130]: E1002 19:07:29.922697 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.922785 kubelet[2130]: W1002 19:07:29.922704 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.922785 kubelet[2130]: E1002 19:07:29.922713 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.923216 kubelet[2130]: E1002 19:07:29.922933 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.923216 kubelet[2130]: W1002 19:07:29.922940 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.923216 kubelet[2130]: E1002 19:07:29.922965 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.923216 kubelet[2130]: E1002 19:07:29.923049 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.923216 kubelet[2130]: W1002 19:07:29.923055 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.923216 kubelet[2130]: E1002 19:07:29.923104 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.923216 kubelet[2130]: E1002 19:07:29.923147 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.923216 kubelet[2130]: W1002 19:07:29.923152 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.923216 kubelet[2130]: E1002 19:07:29.923163 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.923544 kubelet[2130]: E1002 19:07:29.923508 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.923544 kubelet[2130]: W1002 19:07:29.923515 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.923544 kubelet[2130]: E1002 19:07:29.923532 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.923645 kubelet[2130]: E1002 19:07:29.923635 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.923645 kubelet[2130]: W1002 19:07:29.923642 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.923704 kubelet[2130]: E1002 19:07:29.923656 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.923774 kubelet[2130]: E1002 19:07:29.923752 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.923774 kubelet[2130]: W1002 19:07:29.923763 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.923774 kubelet[2130]: E1002 19:07:29.923775 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.923900 kubelet[2130]: E1002 19:07:29.923871 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.923900 kubelet[2130]: W1002 19:07:29.923876 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.923900 kubelet[2130]: E1002 19:07:29.923884 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.923992 kubelet[2130]: E1002 19:07:29.923977 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.923992 kubelet[2130]: W1002 19:07:29.923986 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.924066 kubelet[2130]: E1002 19:07:29.923999 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.924274 kubelet[2130]: E1002 19:07:29.924262 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.924274 kubelet[2130]: W1002 19:07:29.924271 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.924359 kubelet[2130]: E1002 19:07:29.924283 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.924389 kubelet[2130]: E1002 19:07:29.924381 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.924389 kubelet[2130]: W1002 19:07:29.924386 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.924448 kubelet[2130]: E1002 19:07:29.924393 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.924501 kubelet[2130]: E1002 19:07:29.924486 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.924501 kubelet[2130]: W1002 19:07:29.924496 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.924572 kubelet[2130]: E1002 19:07:29.924504 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:29.924676 kubelet[2130]: E1002 19:07:29.924663 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:29.924676 kubelet[2130]: W1002 19:07:29.924673 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:29.924763 kubelet[2130]: E1002 19:07:29.924681 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.022499 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3642872733.mount: Deactivated successfully. Oct 2 19:07:30.925247 kubelet[2130]: E1002 19:07:30.925225 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925247 kubelet[2130]: W1002 19:07:30.925241 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925515 kubelet[2130]: E1002 19:07:30.925263 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.925515 kubelet[2130]: E1002 19:07:30.925346 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925515 kubelet[2130]: W1002 19:07:30.925350 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925515 kubelet[2130]: E1002 19:07:30.925357 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.925515 kubelet[2130]: E1002 19:07:30.925428 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925515 kubelet[2130]: W1002 19:07:30.925432 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925515 kubelet[2130]: E1002 19:07:30.925438 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.925655 kubelet[2130]: E1002 19:07:30.925527 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925655 kubelet[2130]: W1002 19:07:30.925532 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925655 kubelet[2130]: E1002 19:07:30.925537 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.925655 kubelet[2130]: E1002 19:07:30.925617 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925655 kubelet[2130]: W1002 19:07:30.925621 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925655 kubelet[2130]: E1002 19:07:30.925627 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.925772 kubelet[2130]: E1002 19:07:30.925693 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925772 kubelet[2130]: W1002 19:07:30.925697 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925772 kubelet[2130]: E1002 19:07:30.925702 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.925855 kubelet[2130]: E1002 19:07:30.925788 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925855 kubelet[2130]: W1002 19:07:30.925792 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925855 kubelet[2130]: E1002 19:07:30.925807 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.925912 kubelet[2130]: E1002 19:07:30.925878 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925912 kubelet[2130]: W1002 19:07:30.925881 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925912 kubelet[2130]: E1002 19:07:30.925887 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.925970 kubelet[2130]: E1002 19:07:30.925954 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.925970 kubelet[2130]: W1002 19:07:30.925958 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.925970 kubelet[2130]: E1002 19:07:30.925964 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.926062 kubelet[2130]: E1002 19:07:30.926051 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.926062 kubelet[2130]: W1002 19:07:30.926060 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.926115 kubelet[2130]: E1002 19:07:30.926069 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.926149 kubelet[2130]: E1002 19:07:30.926140 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.926149 kubelet[2130]: W1002 19:07:30.926147 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.926205 kubelet[2130]: E1002 19:07:30.926154 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.926227 kubelet[2130]: E1002 19:07:30.926219 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.926227 kubelet[2130]: W1002 19:07:30.926223 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.926269 kubelet[2130]: E1002 19:07:30.926230 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.929460 kubelet[2130]: E1002 19:07:30.929447 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.929460 kubelet[2130]: W1002 19:07:30.929457 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.929528 kubelet[2130]: E1002 19:07:30.929467 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.929603 kubelet[2130]: E1002 19:07:30.929590 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.929603 kubelet[2130]: W1002 19:07:30.929601 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.929667 kubelet[2130]: E1002 19:07:30.929611 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.929717 kubelet[2130]: E1002 19:07:30.929704 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.929717 kubelet[2130]: W1002 19:07:30.929710 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.929717 kubelet[2130]: E1002 19:07:30.929717 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930289 kubelet[2130]: E1002 19:07:30.929793 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930289 kubelet[2130]: W1002 19:07:30.929809 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930289 kubelet[2130]: E1002 19:07:30.929819 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930289 kubelet[2130]: E1002 19:07:30.929905 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930289 kubelet[2130]: W1002 19:07:30.929912 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930289 kubelet[2130]: E1002 19:07:30.929924 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930289 kubelet[2130]: E1002 19:07:30.930005 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930289 kubelet[2130]: W1002 19:07:30.930011 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930289 kubelet[2130]: E1002 19:07:30.930020 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930289 kubelet[2130]: E1002 19:07:30.930089 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930502 kubelet[2130]: W1002 19:07:30.930093 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930502 kubelet[2130]: E1002 19:07:30.930101 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930502 kubelet[2130]: E1002 19:07:30.930186 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930502 kubelet[2130]: W1002 19:07:30.930191 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930502 kubelet[2130]: E1002 19:07:30.930199 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930502 kubelet[2130]: E1002 19:07:30.930337 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930502 kubelet[2130]: W1002 19:07:30.930342 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930502 kubelet[2130]: E1002 19:07:30.930352 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930502 kubelet[2130]: E1002 19:07:30.930415 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930502 kubelet[2130]: W1002 19:07:30.930419 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930707 kubelet[2130]: E1002 19:07:30.930424 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930707 kubelet[2130]: E1002 19:07:30.930496 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930707 kubelet[2130]: W1002 19:07:30.930499 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930707 kubelet[2130]: E1002 19:07:30.930505 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930707 kubelet[2130]: E1002 19:07:30.930661 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930707 kubelet[2130]: W1002 19:07:30.930665 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930707 kubelet[2130]: E1002 19:07:30.930673 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930862 kubelet[2130]: E1002 19:07:30.930769 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930862 kubelet[2130]: W1002 19:07:30.930774 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930862 kubelet[2130]: E1002 19:07:30.930784 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930920 kubelet[2130]: E1002 19:07:30.930891 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930920 kubelet[2130]: W1002 19:07:30.930896 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.930920 kubelet[2130]: E1002 19:07:30.930905 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.930993 kubelet[2130]: E1002 19:07:30.930983 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.930993 kubelet[2130]: W1002 19:07:30.930990 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.931051 kubelet[2130]: E1002 19:07:30.930999 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.931108 kubelet[2130]: E1002 19:07:30.931097 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.931108 kubelet[2130]: W1002 19:07:30.931107 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.931161 kubelet[2130]: E1002 19:07:30.931119 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.931393 kubelet[2130]: E1002 19:07:30.931382 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.931393 kubelet[2130]: W1002 19:07:30.931389 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.931445 kubelet[2130]: E1002 19:07:30.931402 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.931492 kubelet[2130]: E1002 19:07:30.931481 2130 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:07:30.931492 kubelet[2130]: W1002 19:07:30.931489 2130 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:07:30.931538 kubelet[2130]: E1002 19:07:30.931495 2130 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:07:30.967412 env[1146]: time="2023-10-02T19:07:30.967383909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:30.968344 env[1146]: time="2023-10-02T19:07:30.968327146Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:30.969774 env[1146]: time="2023-10-02T19:07:30.969754280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:30.970845 env[1146]: time="2023-10-02T19:07:30.970832040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:30.971400 env[1146]: time="2023-10-02T19:07:30.971382772Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:07:30.973720 env[1146]: time="2023-10-02T19:07:30.973700404Z" level=info msg="CreateContainer within sandbox \"1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:07:30.979484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4294938608.mount: Deactivated successfully. Oct 2 19:07:30.982146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount209021890.mount: Deactivated successfully. Oct 2 19:07:30.992421 env[1146]: time="2023-10-02T19:07:30.991055181Z" level=info msg="CreateContainer within sandbox \"1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c0dc00ec41f79cfab899db139735ce8726a084552249c30f808b38db77e0dd6e\"" Oct 2 19:07:30.993487 env[1146]: time="2023-10-02T19:07:30.993473551Z" level=info msg="StartContainer for \"c0dc00ec41f79cfab899db139735ce8726a084552249c30f808b38db77e0dd6e\"" Oct 2 19:07:31.007225 systemd[1]: Started cri-containerd-c0dc00ec41f79cfab899db139735ce8726a084552249c30f808b38db77e0dd6e.scope. Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2546 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646330306563343166373963666162383939646231333937333563 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit: BPF prog-id=136 op=LOAD Oct 2 19:07:31.019000 audit[2721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000277c70 items=0 ppid=2546 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646330306563343166373963666162383939646231333937333563 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit: BPF prog-id=137 op=LOAD Oct 2 19:07:31.019000 audit[2721]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000277cb8 items=0 ppid=2546 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646330306563343166373963666162383939646231333937333563 Oct 2 19:07:31.019000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:07:31.019000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { perfmon } for pid=2721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit[2721]: AVC avc: denied { bpf } for pid=2721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:31.019000 audit: BPF prog-id=138 op=LOAD Oct 2 19:07:31.019000 audit[2721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000277d48 items=0 ppid=2546 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330646330306563343166373963666162383939646231333937333563 Oct 2 19:07:31.034784 env[1146]: time="2023-10-02T19:07:31.034759507Z" level=info msg="StartContainer for \"c0dc00ec41f79cfab899db139735ce8726a084552249c30f808b38db77e0dd6e\" returns successfully" Oct 2 19:07:31.038707 systemd[1]: cri-containerd-c0dc00ec41f79cfab899db139735ce8726a084552249c30f808b38db77e0dd6e.scope: Deactivated successfully. Oct 2 19:07:31.039000 audit: BPF prog-id=138 op=UNLOAD Oct 2 19:07:31.260465 env[1146]: time="2023-10-02T19:07:31.260433208Z" level=info msg="shim disconnected" id=c0dc00ec41f79cfab899db139735ce8726a084552249c30f808b38db77e0dd6e Oct 2 19:07:31.260627 env[1146]: time="2023-10-02T19:07:31.260610230Z" level=warning msg="cleaning up after shim disconnected" id=c0dc00ec41f79cfab899db139735ce8726a084552249c30f808b38db77e0dd6e namespace=k8s.io Oct 2 19:07:31.260754 env[1146]: time="2023-10-02T19:07:31.260739836Z" level=info msg="cleaning up dead shim" Oct 2 19:07:31.267317 env[1146]: time="2023-10-02T19:07:31.267295134Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:07:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2761 runtime=io.containerd.runc.v2\n" Oct 2 19:07:31.847848 env[1146]: time="2023-10-02T19:07:31.846612540Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:07:31.978546 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c0dc00ec41f79cfab899db139735ce8726a084552249c30f808b38db77e0dd6e-rootfs.mount: Deactivated successfully. Oct 2 19:07:33.125732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1633754051.mount: Deactivated successfully. Oct 2 19:07:36.477893 env[1146]: time="2023-10-02T19:07:36.477851292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:36.479353 env[1146]: time="2023-10-02T19:07:36.479337470Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:36.480362 env[1146]: time="2023-10-02T19:07:36.480345959Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:36.481398 env[1146]: time="2023-10-02T19:07:36.481384729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:36.481734 env[1146]: time="2023-10-02T19:07:36.481716176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:07:36.484325 env[1146]: time="2023-10-02T19:07:36.484309075Z" level=info msg="CreateContainer within sandbox \"1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:07:36.489556 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount23154136.mount: Deactivated successfully. Oct 2 19:07:36.492669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3572634574.mount: Deactivated successfully. Oct 2 19:07:36.505828 env[1146]: time="2023-10-02T19:07:36.505664866Z" level=info msg="CreateContainer within sandbox \"1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"fa4adc65bb83a96ebecd996a10bf68f18d67f049b216c810e2bd6744ab226d5c\"" Oct 2 19:07:36.507443 env[1146]: time="2023-10-02T19:07:36.507424983Z" level=info msg="StartContainer for \"fa4adc65bb83a96ebecd996a10bf68f18d67f049b216c810e2bd6744ab226d5c\"" Oct 2 19:07:36.526287 systemd[1]: Started cri-containerd-fa4adc65bb83a96ebecd996a10bf68f18d67f049b216c810e2bd6744ab226d5c.scope. Oct 2 19:07:36.545678 kernel: kauditd_printk_skb: 103 callbacks suppressed Oct 2 19:07:36.545750 kernel: audit: type=1400 audit(1696273656.538:1133): avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.545773 kernel: audit: type=1300 audit(1696273656.538:1133): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2546 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2546 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:36.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661346164633635626238336139366562656364393936613130626636 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.551847 kernel: audit: type=1327 audit(1696273656.538:1133): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661346164633635626238336139366562656364393936613130626636 Oct 2 19:07:36.551890 kernel: audit: type=1400 audit(1696273656.538:1134): avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.554296 kernel: audit: type=1400 audit(1696273656.538:1134): avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.560671 kernel: audit: type=1400 audit(1696273656.538:1134): avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.560709 kernel: audit: type=1400 audit(1696273656.538:1134): avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.563143 kernel: audit: type=1400 audit(1696273656.538:1134): avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.565828 kernel: audit: type=1400 audit(1696273656.538:1134): avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.568926 kernel: audit: type=1400 audit(1696273656.538:1134): avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.570126 env[1146]: time="2023-10-02T19:07:36.570104901Z" level=info msg="StartContainer for \"fa4adc65bb83a96ebecd996a10bf68f18d67f049b216c810e2bd6744ab226d5c\" returns successfully" Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.538000 audit: BPF prog-id=139 op=LOAD Oct 2 19:07:36.538000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003d6070 items=0 ppid=2546 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:36.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661346164633635626238336139366562656364393936613130626636 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.541000 audit: BPF prog-id=140 op=LOAD Oct 2 19:07:36.541000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003d60b8 items=0 ppid=2546 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:36.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661346164633635626238336139366562656364393936613130626636 Oct 2 19:07:36.544000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:07:36.544000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:36.544000 audit: BPF prog-id=141 op=LOAD Oct 2 19:07:36.544000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003d6148 items=0 ppid=2546 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:36.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661346164633635626238336139366562656364393936613130626636 Oct 2 19:07:37.902497 systemd[1]: cri-containerd-fa4adc65bb83a96ebecd996a10bf68f18d67f049b216c810e2bd6744ab226d5c.scope: Deactivated successfully. Oct 2 19:07:37.908000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:07:37.913454 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fa4adc65bb83a96ebecd996a10bf68f18d67f049b216c810e2bd6744ab226d5c-rootfs.mount: Deactivated successfully. Oct 2 19:07:37.943552 kubelet[2130]: I1002 19:07:37.943532 2130 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:07:37.987995 env[1146]: time="2023-10-02T19:07:37.987966530Z" level=info msg="shim disconnected" id=fa4adc65bb83a96ebecd996a10bf68f18d67f049b216c810e2bd6744ab226d5c Oct 2 19:07:37.988266 env[1146]: time="2023-10-02T19:07:37.988253795Z" level=warning msg="cleaning up after shim disconnected" id=fa4adc65bb83a96ebecd996a10bf68f18d67f049b216c810e2bd6744ab226d5c namespace=k8s.io Oct 2 19:07:37.988313 env[1146]: time="2023-10-02T19:07:37.988303002Z" level=info msg="cleaning up dead shim" Oct 2 19:07:37.994132 env[1146]: time="2023-10-02T19:07:37.994108461Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:07:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2833 runtime=io.containerd.runc.v2\n" Oct 2 19:07:38.005037 kubelet[2130]: I1002 19:07:38.005015 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:38.007934 kubelet[2130]: I1002 19:07:38.007913 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:38.008347 kubelet[2130]: I1002 19:07:38.008338 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:38.015108 systemd[1]: Created slice kubepods-besteffort-pod5b1a5775_4867_4d7e_8fed_7479d0f2fbd4.slice. Oct 2 19:07:38.019964 systemd[1]: Created slice kubepods-burstable-podcd75912f_dd22_46e1_8adf_28b9e6b486d5.slice. Oct 2 19:07:38.023614 systemd[1]: Created slice kubepods-burstable-podbd4a7736_8907_4f4a_8461_cde577053849.slice. Oct 2 19:07:38.026551 kubelet[2130]: I1002 19:07:38.026524 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:38.030034 systemd[1]: Created slice kubepods-besteffort-pod26015d97_edb0_46f0_bac2_de904a2f2b9a.slice. Oct 2 19:07:38.100783 kubelet[2130]: I1002 19:07:38.100760 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4gb2x\" (UniqueName: \"kubernetes.io/projected/cd75912f-dd22-46e1-8adf-28b9e6b486d5-kube-api-access-4gb2x\") pod \"coredns-5d78c9869d-fzdbj\" (UID: \"cd75912f-dd22-46e1-8adf-28b9e6b486d5\") " pod="kube-system/coredns-5d78c9869d-fzdbj" Oct 2 19:07:38.100890 kubelet[2130]: I1002 19:07:38.100803 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgxcm\" (UniqueName: \"kubernetes.io/projected/5b1a5775-4867-4d7e-8fed-7479d0f2fbd4-kube-api-access-rgxcm\") pod \"calico-kube-controllers-7bd445fdb4-lwq9k\" (UID: \"5b1a5775-4867-4d7e-8fed-7479d0f2fbd4\") " pod="calico-system/calico-kube-controllers-7bd445fdb4-lwq9k" Oct 2 19:07:38.100890 kubelet[2130]: I1002 19:07:38.100817 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/26015d97-edb0-46f0-bac2-de904a2f2b9a-etccalico\") pod \"csi-node-driver-rxwsl\" (UID: \"26015d97-edb0-46f0-bac2-de904a2f2b9a\") " pod="calico-system/csi-node-driver-rxwsl" Oct 2 19:07:38.100890 kubelet[2130]: I1002 19:07:38.100830 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/26015d97-edb0-46f0-bac2-de904a2f2b9a-socket-dir\") pod \"csi-node-driver-rxwsl\" (UID: \"26015d97-edb0-46f0-bac2-de904a2f2b9a\") " pod="calico-system/csi-node-driver-rxwsl" Oct 2 19:07:38.100890 kubelet[2130]: I1002 19:07:38.100845 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pxbgx\" (UniqueName: \"kubernetes.io/projected/26015d97-edb0-46f0-bac2-de904a2f2b9a-kube-api-access-pxbgx\") pod \"csi-node-driver-rxwsl\" (UID: \"26015d97-edb0-46f0-bac2-de904a2f2b9a\") " pod="calico-system/csi-node-driver-rxwsl" Oct 2 19:07:38.100890 kubelet[2130]: I1002 19:07:38.100856 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bd4a7736-8907-4f4a-8461-cde577053849-config-volume\") pod \"coredns-5d78c9869d-m9qt9\" (UID: \"bd4a7736-8907-4f4a-8461-cde577053849\") " pod="kube-system/coredns-5d78c9869d-m9qt9" Oct 2 19:07:38.101010 kubelet[2130]: I1002 19:07:38.100880 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/26015d97-edb0-46f0-bac2-de904a2f2b9a-kubelet-dir\") pod \"csi-node-driver-rxwsl\" (UID: \"26015d97-edb0-46f0-bac2-de904a2f2b9a\") " pod="calico-system/csi-node-driver-rxwsl" Oct 2 19:07:38.101010 kubelet[2130]: I1002 19:07:38.100895 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/26015d97-edb0-46f0-bac2-de904a2f2b9a-varrun\") pod \"csi-node-driver-rxwsl\" (UID: \"26015d97-edb0-46f0-bac2-de904a2f2b9a\") " pod="calico-system/csi-node-driver-rxwsl" Oct 2 19:07:38.101010 kubelet[2130]: I1002 19:07:38.100923 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cd75912f-dd22-46e1-8adf-28b9e6b486d5-config-volume\") pod \"coredns-5d78c9869d-fzdbj\" (UID: \"cd75912f-dd22-46e1-8adf-28b9e6b486d5\") " pod="kube-system/coredns-5d78c9869d-fzdbj" Oct 2 19:07:38.101010 kubelet[2130]: I1002 19:07:38.100944 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/26015d97-edb0-46f0-bac2-de904a2f2b9a-registration-dir\") pod \"csi-node-driver-rxwsl\" (UID: \"26015d97-edb0-46f0-bac2-de904a2f2b9a\") " pod="calico-system/csi-node-driver-rxwsl" Oct 2 19:07:38.101010 kubelet[2130]: I1002 19:07:38.100958 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pk48t\" (UniqueName: \"kubernetes.io/projected/bd4a7736-8907-4f4a-8461-cde577053849-kube-api-access-pk48t\") pod \"coredns-5d78c9869d-m9qt9\" (UID: \"bd4a7736-8907-4f4a-8461-cde577053849\") " pod="kube-system/coredns-5d78c9869d-m9qt9" Oct 2 19:07:38.319701 env[1146]: time="2023-10-02T19:07:38.319671093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-lwq9k,Uid:5b1a5775-4867-4d7e-8fed-7479d0f2fbd4,Namespace:calico-system,Attempt:0,}" Oct 2 19:07:38.325171 env[1146]: time="2023-10-02T19:07:38.324772402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-fzdbj,Uid:cd75912f-dd22-46e1-8adf-28b9e6b486d5,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:38.327259 env[1146]: time="2023-10-02T19:07:38.327163382Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-m9qt9,Uid:bd4a7736-8907-4f4a-8461-cde577053849,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:38.335621 env[1146]: time="2023-10-02T19:07:38.335590580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rxwsl,Uid:26015d97-edb0-46f0-bac2-de904a2f2b9a,Namespace:calico-system,Attempt:0,}" Oct 2 19:07:38.414409 env[1146]: time="2023-10-02T19:07:38.414366157Z" level=error msg="Failed to destroy network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.415896 env[1146]: time="2023-10-02T19:07:38.415873569Z" level=error msg="encountered an error cleaning up failed sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.415951 env[1146]: time="2023-10-02T19:07:38.415913262Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-m9qt9,Uid:bd4a7736-8907-4f4a-8461-cde577053849,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.418360 kubelet[2130]: E1002 19:07:38.418223 2130 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.418360 kubelet[2130]: E1002 19:07:38.418270 2130 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-m9qt9" Oct 2 19:07:38.418834 kubelet[2130]: E1002 19:07:38.418731 2130 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-m9qt9" Oct 2 19:07:38.420554 kubelet[2130]: E1002 19:07:38.420518 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-m9qt9_kube-system(bd4a7736-8907-4f4a-8461-cde577053849)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-m9qt9_kube-system(bd4a7736-8907-4f4a-8461-cde577053849)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-m9qt9" podUID=bd4a7736-8907-4f4a-8461-cde577053849 Oct 2 19:07:38.429404 env[1146]: time="2023-10-02T19:07:38.429367358Z" level=error msg="Failed to destroy network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.429712 env[1146]: time="2023-10-02T19:07:38.429695823Z" level=error msg="encountered an error cleaning up failed sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.429808 env[1146]: time="2023-10-02T19:07:38.429785348Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-fzdbj,Uid:cd75912f-dd22-46e1-8adf-28b9e6b486d5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.430686 kubelet[2130]: E1002 19:07:38.429985 2130 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.430686 kubelet[2130]: E1002 19:07:38.430016 2130 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-fzdbj" Oct 2 19:07:38.430686 kubelet[2130]: E1002 19:07:38.430035 2130 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-fzdbj" Oct 2 19:07:38.431588 kubelet[2130]: E1002 19:07:38.430065 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-fzdbj_kube-system(cd75912f-dd22-46e1-8adf-28b9e6b486d5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-fzdbj_kube-system(cd75912f-dd22-46e1-8adf-28b9e6b486d5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-fzdbj" podUID=cd75912f-dd22-46e1-8adf-28b9e6b486d5 Oct 2 19:07:38.439818 env[1146]: time="2023-10-02T19:07:38.439770390Z" level=error msg="Failed to destroy network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.440035 env[1146]: time="2023-10-02T19:07:38.440013647Z" level=error msg="encountered an error cleaning up failed sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.440075 env[1146]: time="2023-10-02T19:07:38.440047539Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rxwsl,Uid:26015d97-edb0-46f0-bac2-de904a2f2b9a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.440197 kubelet[2130]: E1002 19:07:38.440181 2130 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.440232 kubelet[2130]: E1002 19:07:38.440215 2130 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rxwsl" Oct 2 19:07:38.440232 kubelet[2130]: E1002 19:07:38.440228 2130 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rxwsl" Oct 2 19:07:38.440278 kubelet[2130]: E1002 19:07:38.440260 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rxwsl_calico-system(26015d97-edb0-46f0-bac2-de904a2f2b9a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rxwsl_calico-system(26015d97-edb0-46f0-bac2-de904a2f2b9a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:07:38.441745 env[1146]: time="2023-10-02T19:07:38.441720421Z" level=error msg="Failed to destroy network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.442010 env[1146]: time="2023-10-02T19:07:38.441970885Z" level=error msg="encountered an error cleaning up failed sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.442010 env[1146]: time="2023-10-02T19:07:38.441996382Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-lwq9k,Uid:5b1a5775-4867-4d7e-8fed-7479d0f2fbd4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.442082 kubelet[2130]: E1002 19:07:38.442076 2130 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.442128 kubelet[2130]: E1002 19:07:38.442094 2130 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-lwq9k" Oct 2 19:07:38.442128 kubelet[2130]: E1002 19:07:38.442106 2130 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-lwq9k" Oct 2 19:07:38.442404 kubelet[2130]: E1002 19:07:38.442130 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bd445fdb4-lwq9k_calico-system(5b1a5775-4867-4d7e-8fed-7479d0f2fbd4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bd445fdb4-lwq9k_calico-system(5b1a5775-4867-4d7e-8fed-7479d0f2fbd4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-lwq9k" podUID=5b1a5775-4867-4d7e-8fed-7479d0f2fbd4 Oct 2 19:07:38.864832 kubelet[2130]: I1002 19:07:38.864501 2130 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:07:38.871293 env[1146]: time="2023-10-02T19:07:38.871268050Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:07:38.873358 env[1146]: time="2023-10-02T19:07:38.873335945Z" level=info msg="StopPodSandbox for \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\"" Oct 2 19:07:38.874110 kubelet[2130]: I1002 19:07:38.874064 2130 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:07:38.874498 env[1146]: time="2023-10-02T19:07:38.874332944Z" level=info msg="StopPodSandbox for \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\"" Oct 2 19:07:38.875261 kubelet[2130]: I1002 19:07:38.875158 2130 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:07:38.875865 env[1146]: time="2023-10-02T19:07:38.875846567Z" level=info msg="StopPodSandbox for \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\"" Oct 2 19:07:38.882246 kubelet[2130]: I1002 19:07:38.882227 2130 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:07:38.882498 env[1146]: time="2023-10-02T19:07:38.882474275Z" level=info msg="StopPodSandbox for \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\"" Oct 2 19:07:38.923774 env[1146]: time="2023-10-02T19:07:38.923734295Z" level=error msg="StopPodSandbox for \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\" failed" error="failed to destroy network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.924088 kubelet[2130]: E1002 19:07:38.924071 2130 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:07:38.924381 kubelet[2130]: E1002 19:07:38.924368 2130 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716} Oct 2 19:07:38.924416 kubelet[2130]: E1002 19:07:38.924399 2130 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cd75912f-dd22-46e1-8adf-28b9e6b486d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:07:38.924479 kubelet[2130]: E1002 19:07:38.924431 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cd75912f-dd22-46e1-8adf-28b9e6b486d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-fzdbj" podUID=cd75912f-dd22-46e1-8adf-28b9e6b486d5 Oct 2 19:07:38.926373 env[1146]: time="2023-10-02T19:07:38.926343010Z" level=error msg="StopPodSandbox for \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\" failed" error="failed to destroy network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.926459 kubelet[2130]: E1002 19:07:38.926450 2130 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:07:38.926495 kubelet[2130]: E1002 19:07:38.926466 2130 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b} Oct 2 19:07:38.926524 kubelet[2130]: E1002 19:07:38.926495 2130 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5b1a5775-4867-4d7e-8fed-7479d0f2fbd4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:07:38.926524 kubelet[2130]: E1002 19:07:38.926513 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5b1a5775-4867-4d7e-8fed-7479d0f2fbd4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-lwq9k" podUID=5b1a5775-4867-4d7e-8fed-7479d0f2fbd4 Oct 2 19:07:38.926880 env[1146]: time="2023-10-02T19:07:38.926858339Z" level=error msg="StopPodSandbox for \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\" failed" error="failed to destroy network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.927008 kubelet[2130]: E1002 19:07:38.926998 2130 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:07:38.927043 kubelet[2130]: E1002 19:07:38.927012 2130 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a} Oct 2 19:07:38.927043 kubelet[2130]: E1002 19:07:38.927029 2130 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bd4a7736-8907-4f4a-8461-cde577053849\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:07:38.927110 kubelet[2130]: E1002 19:07:38.927051 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bd4a7736-8907-4f4a-8461-cde577053849\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-m9qt9" podUID=bd4a7736-8907-4f4a-8461-cde577053849 Oct 2 19:07:38.931254 env[1146]: time="2023-10-02T19:07:38.931228609Z" level=error msg="StopPodSandbox for \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\" failed" error="failed to destroy network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:07:38.931375 kubelet[2130]: E1002 19:07:38.931356 2130 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:07:38.931420 kubelet[2130]: E1002 19:07:38.931385 2130 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34} Oct 2 19:07:38.931420 kubelet[2130]: E1002 19:07:38.931404 2130 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"26015d97-edb0-46f0-bac2-de904a2f2b9a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:07:38.931487 kubelet[2130]: E1002 19:07:38.931421 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"26015d97-edb0-46f0-bac2-de904a2f2b9a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:07:42.710473 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1250332957.mount: Deactivated successfully. Oct 2 19:07:42.802722 env[1146]: time="2023-10-02T19:07:42.802690843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.804620 env[1146]: time="2023-10-02T19:07:42.804596736Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.805508 env[1146]: time="2023-10-02T19:07:42.805489015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.806351 env[1146]: time="2023-10-02T19:07:42.806334143Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.806745 env[1146]: time="2023-10-02T19:07:42.806727418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:07:42.809730 env[1146]: time="2023-10-02T19:07:42.809708789Z" level=info msg="CreateContainer within sandbox \"1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:07:42.818215 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3019468801.mount: Deactivated successfully. Oct 2 19:07:42.822416 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3425789556.mount: Deactivated successfully. Oct 2 19:07:42.826841 env[1146]: time="2023-10-02T19:07:42.826813851Z" level=info msg="CreateContainer within sandbox \"1f7d0478c32d616730d5a81de2fe367b2ebcc089add073dfae7ec2a1797bed53\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d\"" Oct 2 19:07:42.828309 env[1146]: time="2023-10-02T19:07:42.828042882Z" level=info msg="StartContainer for \"b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d\"" Oct 2 19:07:42.839733 systemd[1]: Started cri-containerd-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d.scope. Oct 2 19:07:42.851000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.853425 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:07:42.855850 kernel: audit: type=1400 audit(1696273662.851:1140): avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.851000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2546 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:42.859553 kernel: audit: type=1300 audit(1696273662.851:1140): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2546 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:42.859579 kernel: audit: type=1327 audit(1696273662.851:1140): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613165323436333763666439616562336635373035656661373338 Oct 2 19:07:42.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613165323436333763666439616562336635373035656661373338 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.867572 kernel: audit: type=1400 audit(1696273662.855:1141): avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.867602 kernel: audit: type=1400 audit(1696273662.855:1141): avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.867617 kernel: audit: type=1400 audit(1696273662.855:1141): avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.872610 kernel: audit: type=1400 audit(1696273662.855:1141): avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.874998 kernel: audit: type=1400 audit(1696273662.855:1141): avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.875019 kernel: audit: type=1400 audit(1696273662.855:1141): avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit: BPF prog-id=142 op=LOAD Oct 2 19:07:42.880921 kernel: audit: type=1400 audit(1696273662.855:1141): avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.855000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000213c10 items=0 ppid=2546 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:42.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613165323436333763666439616562336635373035656661373338 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.862000 audit: BPF prog-id=143 op=LOAD Oct 2 19:07:42.862000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000213c58 items=0 ppid=2546 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:42.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613165323436333763666439616562336635373035656661373338 Oct 2 19:07:42.864000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:07:42.864000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:42.864000 audit: BPF prog-id=144 op=LOAD Oct 2 19:07:42.864000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000213ce8 items=0 ppid=2546 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:42.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613165323436333763666439616562336635373035656661373338 Oct 2 19:07:42.893826 env[1146]: time="2023-10-02T19:07:42.890150552Z" level=info msg="StartContainer for \"b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d\" returns successfully" Oct 2 19:07:42.973464 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:07:42.973529 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:07:43.914571 systemd[1]: run-containerd-runc-k8s.io-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d-runc.ZLveRF.mount: Deactivated successfully. Oct 2 19:07:43.915739 kubelet[2130]: I1002 19:07:43.915584 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-x649m" podStartSLOduration=2.510264239 podCreationTimestamp="2023-10-02 19:07:25 +0000 UTC" firstStartedPulling="2023-10-02 19:07:26.407636056 +0000 UTC m=+20.702073893" lastFinishedPulling="2023-10-02 19:07:42.80696689 +0000 UTC m=+37.101404734" observedRunningTime="2023-10-02 19:07:43.909185049 +0000 UTC m=+38.203622897" watchObservedRunningTime="2023-10-02 19:07:43.90959508 +0000 UTC m=+38.204032917" Oct 2 19:07:44.175000 audit[3187]: AVC avc: denied { write } for pid=3187 comm="tee" name="fd" dev="proc" ino=34529 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:07:44.175000 audit[3187]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd470d3995 a2=241 a3=1b6 items=1 ppid=3160 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.175000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:07:44.175000 audit: PATH item=0 name="/dev/fd/63" inode=34514 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:44.180000 audit[3203]: AVC avc: denied { write } for pid=3203 comm="tee" name="fd" dev="proc" ino=34542 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:07:44.180000 audit[3203]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeca757994 a2=241 a3=1b6 items=1 ppid=3154 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.180000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:07:44.180000 audit: PATH item=0 name="/dev/fd/63" inode=35106 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:44.180000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:07:44.181000 audit[3205]: AVC avc: denied { write } for pid=3205 comm="tee" name="fd" dev="proc" ino=34548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:07:44.181000 audit[3205]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb4e41983 a2=241 a3=1b6 items=1 ppid=3152 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.181000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:07:44.181000 audit: PATH item=0 name="/dev/fd/63" inode=34525 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:44.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:07:44.175000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:07:44.183000 audit[3211]: AVC avc: denied { write } for pid=3211 comm="tee" name="fd" dev="proc" ino=34552 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:07:44.183000 audit[3211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8b3ae993 a2=241 a3=1b6 items=1 ppid=3159 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.183000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:07:44.183000 audit: PATH item=0 name="/dev/fd/63" inode=34526 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:44.183000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:07:44.184000 audit[3196]: AVC avc: denied { write } for pid=3196 comm="tee" name="fd" dev="proc" ino=34556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:07:44.184000 audit[3196]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc36f2b993 a2=241 a3=1b6 items=1 ppid=3162 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.184000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:07:44.184000 audit: PATH item=0 name="/dev/fd/63" inode=34517 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:44.184000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:07:44.192000 audit[3218]: AVC avc: denied { write } for pid=3218 comm="tee" name="fd" dev="proc" ino=34560 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:07:44.192000 audit[3218]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd91e54984 a2=241 a3=1b6 items=1 ppid=3150 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.192000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:07:44.192000 audit: PATH item=0 name="/dev/fd/63" inode=34539 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:44.192000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:07:44.197000 audit[3222]: AVC avc: denied { write } for pid=3222 comm="tee" name="fd" dev="proc" ino=34564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:07:44.197000 audit[3222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd755cb993 a2=241 a3=1b6 items=1 ppid=3156 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.197000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:07:44.197000 audit: PATH item=0 name="/dev/fd/63" inode=35112 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:44.197000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit: BPF prog-id=145 op=LOAD Oct 2 19:07:44.527000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc700807e0 a2=70 a3=7fdda3a97000 items=0 ppid=3164 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:07:44.527000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit: BPF prog-id=146 op=LOAD Oct 2 19:07:44.527000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc700807e0 a2=70 a3=6e items=0 ppid=3164 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:07:44.527000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc70080790 a2=70 a3=7ffc700807e0 items=0 ppid=3164 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit: BPF prog-id=147 op=LOAD Oct 2 19:07:44.527000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc70080770 a2=70 a3=7ffc700807e0 items=0 ppid=3164 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:07:44.527000 audit: BPF prog-id=147 op=UNLOAD Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc70080850 a2=70 a3=0 items=0 ppid=3164 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc70080840 a2=70 a3=0 items=0 ppid=3164 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:07:44.527000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.527000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc70080880 a2=70 a3=0 items=0 ppid=3164 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.527000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.528000 audit: BPF prog-id=148 op=LOAD Oct 2 19:07:44.528000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc700807a0 a2=70 a3=ffffffff items=0 ppid=3164 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:07:44.531000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.531000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd30da02e0 a2=70 a3=fff80800 items=0 ppid=3164 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:07:44.531000 audit[3297]: AVC avc: denied { bpf } for pid=3297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:44.531000 audit[3297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd30da01b0 a2=70 a3=3 items=0 ppid=3164 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:07:44.540000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:07:44.540000 audit[3164]: SYSCALL arch=c000003e syscall=35 success=yes exit=0 a0=7fe0640b5da0 a1=0 a2=0 a3=30 items=0 ppid=3146 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="calico-node" exe="/usr/bin/calico-node" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.540000 audit: PROCTITLE proctitle=63616C69636F2D6E6F6465002D66656C6978 Oct 2 19:07:44.641000 audit[3335]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3335 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:44.641000 audit[3335]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd7e975860 a2=0 a3=7ffd7e97584c items=0 ppid=3164 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.641000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:44.645000 audit[3331]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:44.645000 audit[3331]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffda0b7dba0 a2=0 a3=560b25720000 items=0 ppid=3164 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.645000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:44.645000 audit[3332]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=3332 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:44.645000 audit[3332]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffff9fe9510 a2=0 a3=55c780275000 items=0 ppid=3164 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.645000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:44.646000 audit[3333]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:44.646000 audit[3333]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe57da5c80 a2=0 a3=55855607e000 items=0 ppid=3164 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:44.646000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:44.906837 systemd[1]: run-containerd-runc-k8s.io-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d-runc.79EcLs.mount: Deactivated successfully. Oct 2 19:07:45.459677 systemd-networkd[1052]: vxlan.calico: Link UP Oct 2 19:07:45.459682 systemd-networkd[1052]: vxlan.calico: Gained carrier Oct 2 19:07:46.238434 systemd[1]: run-containerd-runc-k8s.io-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d-runc.2CS1W4.mount: Deactivated successfully. Oct 2 19:07:47.254037 systemd-networkd[1052]: vxlan.calico: Gained IPv6LL Oct 2 19:07:49.779025 env[1146]: time="2023-10-02T19:07:49.778786480Z" level=info msg="StopPodSandbox for \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\"" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.831 [INFO][3432] k8s.go 576: Cleaning up netns ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.831 [INFO][3432] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" iface="eth0" netns="/var/run/netns/cni-7717101e-64fd-eb37-ed7e-bafd4c1500f2" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.832 [INFO][3432] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" iface="eth0" netns="/var/run/netns/cni-7717101e-64fd-eb37-ed7e-bafd4c1500f2" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.833 [INFO][3432] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" iface="eth0" netns="/var/run/netns/cni-7717101e-64fd-eb37-ed7e-bafd4c1500f2" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.833 [INFO][3432] k8s.go 583: Releasing IP address(es) ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.833 [INFO][3432] utils.go 196: Calico CNI releasing IP address ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.979 [INFO][3438] ipam_plugin.go 416: Releasing address using handleID ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:49.999561 env[1146]: time="2023-10-02T19:07:49Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:49.999561 env[1146]: time="2023-10-02T19:07:49Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.996 [WARNING][3438] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.996 [INFO][3438] ipam_plugin.go 444: Releasing address using workloadID ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:49.999561 env[1146]: time="2023-10-02T19:07:49Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:49.999561 env[1146]: 2023-10-02 19:07:49.998 [INFO][3432] k8s.go 589: Teardown processing complete. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:07:50.001283 systemd[1]: run-netns-cni\x2d7717101e\x2d64fd\x2deb37\x2ded7e\x2dbafd4c1500f2.mount: Deactivated successfully. Oct 2 19:07:50.002153 env[1146]: time="2023-10-02T19:07:50.002128150Z" level=info msg="TearDown network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\" successfully" Oct 2 19:07:50.002228 env[1146]: time="2023-10-02T19:07:50.002212908Z" level=info msg="StopPodSandbox for \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\" returns successfully" Oct 2 19:07:50.003146 env[1146]: time="2023-10-02T19:07:50.003121474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rxwsl,Uid:26015d97-edb0-46f0-bac2-de904a2f2b9a,Namespace:calico-system,Attempt:1,}" Oct 2 19:07:50.098211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:07:50.098292 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali64fb9549528: link becomes ready Oct 2 19:07:50.105872 systemd-networkd[1052]: cali64fb9549528: Link UP Oct 2 19:07:50.105876 systemd-networkd[1052]: cali64fb9549528: Gained carrier Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.044 [INFO][3444] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--rxwsl-eth0 csi-node-driver- calico-system 26015d97-edb0-46f0-bac2-de904a2f2b9a 654 0 2023-10-02 19:07:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-rxwsl eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali64fb9549528 [] []}} ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Namespace="calico-system" Pod="csi-node-driver-rxwsl" WorkloadEndpoint="localhost-k8s-csi--node--driver--rxwsl-" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.045 [INFO][3444] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Namespace="calico-system" Pod="csi-node-driver-rxwsl" WorkloadEndpoint="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.064 [INFO][3456] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" HandleID="k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.070 [INFO][3456] ipam_plugin.go 269: Auto assigning IP ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" HandleID="k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004db00), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-rxwsl", "timestamp":"2023-10-02 19:07:50.064849417 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:07:50.113488 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:50.113488 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.070 [INFO][3456] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.075 [INFO][3456] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" host="localhost" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.080 [INFO][3456] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.082 [INFO][3456] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.083 [INFO][3456] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.084 [INFO][3456] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.084 [INFO][3456] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" host="localhost" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.085 [INFO][3456] ipam.go 1682: Creating new handle: k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.089 [INFO][3456] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" host="localhost" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.093 [INFO][3456] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" host="localhost" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.093 [INFO][3456] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" host="localhost" Oct 2 19:07:50.113488 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:50.113488 env[1146]: 2023-10-02 19:07:50.094 [INFO][3456] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" HandleID="k8s-pod-network.7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:50.114025 env[1146]: 2023-10-02 19:07:50.095 [INFO][3444] k8s.go 383: Populated endpoint ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Namespace="calico-system" Pod="csi-node-driver-rxwsl" WorkloadEndpoint="localhost-k8s-csi--node--driver--rxwsl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rxwsl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"26015d97-edb0-46f0-bac2-de904a2f2b9a", ResourceVersion:"654", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-rxwsl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali64fb9549528", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:50.114025 env[1146]: 2023-10-02 19:07:50.095 [INFO][3444] k8s.go 384: Calico CNI using IPs: [192.168.88.129/32] ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Namespace="calico-system" Pod="csi-node-driver-rxwsl" WorkloadEndpoint="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:50.114025 env[1146]: 2023-10-02 19:07:50.095 [INFO][3444] dataplane_linux.go 68: Setting the host side veth name to cali64fb9549528 ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Namespace="calico-system" Pod="csi-node-driver-rxwsl" WorkloadEndpoint="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:50.114025 env[1146]: 2023-10-02 19:07:50.098 [INFO][3444] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Namespace="calico-system" Pod="csi-node-driver-rxwsl" WorkloadEndpoint="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:50.114025 env[1146]: 2023-10-02 19:07:50.104 [INFO][3444] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Namespace="calico-system" Pod="csi-node-driver-rxwsl" WorkloadEndpoint="localhost-k8s-csi--node--driver--rxwsl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rxwsl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"26015d97-edb0-46f0-bac2-de904a2f2b9a", ResourceVersion:"654", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd", Pod:"csi-node-driver-rxwsl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali64fb9549528", MAC:"2e:e0:b4:cc:91:86", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:50.114025 env[1146]: 2023-10-02 19:07:50.112 [INFO][3444] k8s.go 489: Wrote updated endpoint to datastore ContainerID="7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd" Namespace="calico-system" Pod="csi-node-driver-rxwsl" WorkloadEndpoint="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:07:50.131445 env[1146]: time="2023-10-02T19:07:50.131394554Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:50.131641 env[1146]: time="2023-10-02T19:07:50.131624976Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:50.133211 env[1146]: time="2023-10-02T19:07:50.133191393Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:50.133384 env[1146]: time="2023-10-02T19:07:50.133368932Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd pid=3481 runtime=io.containerd.runc.v2 Oct 2 19:07:50.148562 systemd[1]: Started cri-containerd-7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd.scope. Oct 2 19:07:50.160817 kernel: kauditd_printk_skb: 153 callbacks suppressed Oct 2 19:07:50.160894 kernel: audit: type=1325 audit(1696273670.156:1171): table=filter:101 family=2 entries=36 op=nft_register_chain pid=3508 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:50.160913 kernel: audit: type=1300 audit(1696273670.156:1171): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe6baf3f80 a2=0 a3=7ffe6baf3f6c items=0 ppid=3164 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.156000 audit[3508]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3508 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:50.164126 kernel: audit: type=1327 audit(1696273670.156:1171): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:50.156000 audit[3508]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe6baf3f80 a2=0 a3=7ffe6baf3f6c items=0 ppid=3164 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.156000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.178831 kernel: audit: type=1400 audit(1696273670.174:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.179324 systemd-resolved[1097]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.183857 kernel: audit: type=1400 audit(1696273670.174:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.192819 kernel: audit: type=1400 audit(1696273670.174:1174): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.192854 kernel: audit: type=1400 audit(1696273670.174:1175): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.192883 kernel: audit: type=1400 audit(1696273670.174:1176): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.198087 kernel: audit: type=1400 audit(1696273670.174:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.198128 kernel: audit: type=1400 audit(1696273670.174:1178): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.174000 audit: BPF prog-id=149 op=LOAD Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3481 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386164656533663863636237616230346533306137316563323661 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3481 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386164656533663863636237616230346533306137316563323661 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.175000 audit: BPF prog-id=150 op=LOAD Oct 2 19:07:50.175000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000388340 items=0 ppid=3481 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386164656533663863636237616230346533306137316563323661 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit: BPF prog-id=151 op=LOAD Oct 2 19:07:50.177000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000388388 items=0 ppid=3481 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386164656533663863636237616230346533306137316563323661 Oct 2 19:07:50.177000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:07:50.177000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.177000 audit: BPF prog-id=152 op=LOAD Oct 2 19:07:50.177000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000388798 items=0 ppid=3481 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761386164656533663863636237616230346533306137316563323661 Oct 2 19:07:50.203470 env[1146]: time="2023-10-02T19:07:50.202191416Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rxwsl,Uid:26015d97-edb0-46f0-bac2-de904a2f2b9a,Namespace:calico-system,Attempt:1,} returns sandbox id \"7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd\"" Oct 2 19:07:50.204245 env[1146]: time="2023-10-02T19:07:50.204226558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:07:50.469014 env[1146]: time="2023-10-02T19:07:50.468923032Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:07:50.469527 env[1146]: time="2023-10-02T19:07:50.469477117Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:07:50.472462 kubelet[2130]: E1002 19:07:50.472311 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:07:50.472462 kubelet[2130]: E1002 19:07:50.472347 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:07:50.473581 kubelet[2130]: E1002 19:07:50.473473 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-pxbgx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-rxwsl_calico-system(26015d97-edb0-46f0-bac2-de904a2f2b9a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:07:50.474140 env[1146]: time="2023-10-02T19:07:50.474121552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:07:50.733746 env[1146]: time="2023-10-02T19:07:50.733690077Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:07:50.734037 env[1146]: time="2023-10-02T19:07:50.734015043Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:07:50.734471 kubelet[2130]: E1002 19:07:50.734203 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:07:50.734471 kubelet[2130]: E1002 19:07:50.734235 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:07:50.734471 kubelet[2130]: E1002 19:07:50.734297 2130 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-pxbgx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-rxwsl_calico-system(26015d97-edb0-46f0-bac2-de904a2f2b9a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:07:50.734471 kubelet[2130]: E1002 19:07:50.734340 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:07:50.777904 env[1146]: time="2023-10-02T19:07:50.777881018Z" level=info msg="StopPodSandbox for \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\"" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.802 [INFO][3536] k8s.go 576: Cleaning up netns ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.802 [INFO][3536] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" iface="eth0" netns="/var/run/netns/cni-178cd703-a3fc-d626-93cc-82a4f264122c" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.803 [INFO][3536] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" iface="eth0" netns="/var/run/netns/cni-178cd703-a3fc-d626-93cc-82a4f264122c" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.803 [INFO][3536] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" iface="eth0" netns="/var/run/netns/cni-178cd703-a3fc-d626-93cc-82a4f264122c" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.803 [INFO][3536] k8s.go 583: Releasing IP address(es) ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.803 [INFO][3536] utils.go 196: Calico CNI releasing IP address ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.815 [INFO][3543] ipam_plugin.go 416: Releasing address using handleID ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.822054 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:50.822054 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.819 [WARNING][3543] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.819 [INFO][3543] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.822054 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:50.822054 env[1146]: 2023-10-02 19:07:50.821 [INFO][3536] k8s.go 589: Teardown processing complete. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:07:50.822623 env[1146]: time="2023-10-02T19:07:50.822603100Z" level=info msg="TearDown network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\" successfully" Oct 2 19:07:50.822675 env[1146]: time="2023-10-02T19:07:50.822663324Z" level=info msg="StopPodSandbox for \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\" returns successfully" Oct 2 19:07:50.823148 env[1146]: time="2023-10-02T19:07:50.823135480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-lwq9k,Uid:5b1a5775-4867-4d7e-8fed-7479d0f2fbd4,Namespace:calico-system,Attempt:1,}" Oct 2 19:07:50.888815 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali516dc52b1b3: link becomes ready Oct 2 19:07:50.894870 systemd-networkd[1052]: cali516dc52b1b3: Link UP Oct 2 19:07:50.894875 systemd-networkd[1052]: cali516dc52b1b3: Gained carrier Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.847 [INFO][3549] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0 calico-kube-controllers-7bd445fdb4- calico-system 5b1a5775-4867-4d7e-8fed-7479d0f2fbd4 668 0 2023-10-02 19:07:26 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bd445fdb4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7bd445fdb4-lwq9k eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali516dc52b1b3 [] []}} ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-lwq9k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.847 [INFO][3549] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-lwq9k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.866 [INFO][3561] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" HandleID="k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.871 [INFO][3561] ipam_plugin.go 269: Auto assigning IP ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" HandleID="k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004c020), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7bd445fdb4-lwq9k", "timestamp":"2023-10-02 19:07:50.866629157 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:07:50.904575 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:50.904575 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.871 [INFO][3561] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.872 [INFO][3561] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" host="localhost" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.874 [INFO][3561] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.876 [INFO][3561] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.877 [INFO][3561] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.878 [INFO][3561] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.878 [INFO][3561] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" host="localhost" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.879 [INFO][3561] ipam.go 1682: Creating new handle: k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.881 [INFO][3561] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" host="localhost" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.884 [INFO][3561] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" host="localhost" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.884 [INFO][3561] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" host="localhost" Oct 2 19:07:50.904575 env[1146]: time="2023-10-02T19:07:50Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:50.904575 env[1146]: 2023-10-02 19:07:50.884 [INFO][3561] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" HandleID="k8s-pod-network.828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.905039 env[1146]: 2023-10-02 19:07:50.885 [INFO][3549] k8s.go 383: Populated endpoint ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-lwq9k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"5b1a5775-4867-4d7e-8fed-7479d0f2fbd4", ResourceVersion:"668", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7bd445fdb4-lwq9k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali516dc52b1b3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:50.905039 env[1146]: 2023-10-02 19:07:50.886 [INFO][3549] k8s.go 384: Calico CNI using IPs: [192.168.88.130/32] ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-lwq9k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.905039 env[1146]: 2023-10-02 19:07:50.886 [INFO][3549] dataplane_linux.go 68: Setting the host side veth name to cali516dc52b1b3 ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-lwq9k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.905039 env[1146]: 2023-10-02 19:07:50.888 [INFO][3549] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-lwq9k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.905039 env[1146]: 2023-10-02 19:07:50.893 [INFO][3549] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-lwq9k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"5b1a5775-4867-4d7e-8fed-7479d0f2fbd4", ResourceVersion:"668", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea", Pod:"calico-kube-controllers-7bd445fdb4-lwq9k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali516dc52b1b3", MAC:"82:e6:4c:5a:cc:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:50.905039 env[1146]: 2023-10-02 19:07:50.902 [INFO][3549] k8s.go 489: Wrote updated endpoint to datastore ContainerID="828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-lwq9k" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:07:50.909051 kubelet[2130]: E1002 19:07:50.908115 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:07:50.920162 env[1146]: time="2023-10-02T19:07:50.920123006Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:50.920291 env[1146]: time="2023-10-02T19:07:50.920277049Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:50.920361 env[1146]: time="2023-10-02T19:07:50.920347970Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:50.920512 env[1146]: time="2023-10-02T19:07:50.920476569Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea pid=3587 runtime=io.containerd.runc.v2 Oct 2 19:07:50.928015 systemd[1]: Started cri-containerd-828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea.scope. Oct 2 19:07:50.931000 audit[3610]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3610 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:50.931000 audit[3610]: SYSCALL arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7ffc0a583810 a2=0 a3=7ffc0a5837fc items=0 ppid=3164 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.931000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit: BPF prog-id=153 op=LOAD Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3587 pid=3597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832383438326261336531386366353636653635626339646238663434 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3587 pid=3597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832383438326261336531386366353636653635626339646238663434 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.940000 audit: BPF prog-id=154 op=LOAD Oct 2 19:07:50.940000 audit[3597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216c00 items=0 ppid=3587 pid=3597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832383438326261336531386366353636653635626339646238663434 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit: BPF prog-id=155 op=LOAD Oct 2 19:07:50.941000 audit[3597]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216c48 items=0 ppid=3587 pid=3597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832383438326261336531386366353636653635626339646238663434 Oct 2 19:07:50.941000 audit: BPF prog-id=155 op=UNLOAD Oct 2 19:07:50.941000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { perfmon } for pid=3597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit[3597]: AVC avc: denied { bpf } for pid=3597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:50.941000 audit: BPF prog-id=156 op=LOAD Oct 2 19:07:50.941000 audit[3597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000217058 items=0 ppid=3587 pid=3597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:50.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832383438326261336531386366353636653635626339646238663434 Oct 2 19:07:50.943683 systemd-resolved[1097]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:07:50.963520 env[1146]: time="2023-10-02T19:07:50.963492718Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-lwq9k,Uid:5b1a5775-4867-4d7e-8fed-7479d0f2fbd4,Namespace:calico-system,Attempt:1,} returns sandbox id \"828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea\"" Oct 2 19:07:50.965662 env[1146]: time="2023-10-02T19:07:50.965634216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:07:51.006037 systemd[1]: run-containerd-runc-k8s.io-7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd-runc.kfghg1.mount: Deactivated successfully. Oct 2 19:07:51.006095 systemd[1]: run-netns-cni\x2d178cd703\x2da3fc\x2dd626\x2d93cc\x2d82a4f264122c.mount: Deactivated successfully. Oct 2 19:07:51.285896 systemd-networkd[1052]: cali64fb9549528: Gained IPv6LL Oct 2 19:07:51.909399 kubelet[2130]: E1002 19:07:51.909379 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:07:52.949944 systemd-networkd[1052]: cali516dc52b1b3: Gained IPv6LL Oct 2 19:07:53.617753 env[1146]: time="2023-10-02T19:07:53.617718738Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:53.627141 env[1146]: time="2023-10-02T19:07:53.627112688Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:53.633591 env[1146]: time="2023-10-02T19:07:53.631542721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:53.636171 env[1146]: time="2023-10-02T19:07:53.636143941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:53.636655 env[1146]: time="2023-10-02T19:07:53.636629941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:07:53.638344 env[1146]: time="2023-10-02T19:07:53.638321100Z" level=info msg="CreateContainer within sandbox \"828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:07:53.657566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2162157224.mount: Deactivated successfully. Oct 2 19:07:53.661332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4206993607.mount: Deactivated successfully. Oct 2 19:07:53.671442 env[1146]: time="2023-10-02T19:07:53.671415050Z" level=info msg="CreateContainer within sandbox \"828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc\"" Oct 2 19:07:53.672934 env[1146]: time="2023-10-02T19:07:53.671935352Z" level=info msg="StartContainer for \"de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc\"" Oct 2 19:07:53.696456 systemd[1]: Started cri-containerd-de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc.scope. Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit: BPF prog-id=157 op=LOAD Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3587 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396636313666626131343339646361646337633837323835306134 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3587 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396636313666626131343339646361646337633837323835306134 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit: BPF prog-id=158 op=LOAD Oct 2 19:07:53.705000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b51a0 items=0 ppid=3587 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396636313666626131343339646361646337633837323835306134 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.705000 audit: BPF prog-id=159 op=LOAD Oct 2 19:07:53.705000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b51e8 items=0 ppid=3587 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:53.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396636313666626131343339646361646337633837323835306134 Oct 2 19:07:53.705000 audit: BPF prog-id=159 op=UNLOAD Oct 2 19:07:53.705000 audit: BPF prog-id=158 op=UNLOAD Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:53.706000 audit: BPF prog-id=160 op=LOAD Oct 2 19:07:53.706000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b55f8 items=0 ppid=3587 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:53.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465396636313666626131343339646361646337633837323835306134 Oct 2 19:07:53.719239 env[1146]: time="2023-10-02T19:07:53.719210924Z" level=info msg="StartContainer for \"de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc\" returns successfully" Oct 2 19:07:53.786456 env[1146]: time="2023-10-02T19:07:53.786422231Z" level=info msg="StopPodSandbox for \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\"" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.827 [INFO][3687] k8s.go 576: Cleaning up netns ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.827 [INFO][3687] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" iface="eth0" netns="/var/run/netns/cni-8401f983-cbbf-bf76-5a0a-23425e80d8a8" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.828 [INFO][3687] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" iface="eth0" netns="/var/run/netns/cni-8401f983-cbbf-bf76-5a0a-23425e80d8a8" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.828 [INFO][3687] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" iface="eth0" netns="/var/run/netns/cni-8401f983-cbbf-bf76-5a0a-23425e80d8a8" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.828 [INFO][3687] k8s.go 583: Releasing IP address(es) ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.828 [INFO][3687] utils.go 196: Calico CNI releasing IP address ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.853 [INFO][3693] ipam_plugin.go 416: Releasing address using handleID ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:53.866137 env[1146]: time="2023-10-02T19:07:53Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:53.866137 env[1146]: time="2023-10-02T19:07:53Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.861 [WARNING][3693] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.862 [INFO][3693] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:53.866137 env[1146]: time="2023-10-02T19:07:53Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:53.866137 env[1146]: 2023-10-02 19:07:53.865 [INFO][3687] k8s.go 589: Teardown processing complete. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:07:53.866510 env[1146]: time="2023-10-02T19:07:53.866267963Z" level=info msg="TearDown network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\" successfully" Oct 2 19:07:53.866510 env[1146]: time="2023-10-02T19:07:53.866288164Z" level=info msg="StopPodSandbox for \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\" returns successfully" Oct 2 19:07:53.866984 env[1146]: time="2023-10-02T19:07:53.866689638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-fzdbj,Uid:cd75912f-dd22-46e1-8adf-28b9e6b486d5,Namespace:kube-system,Attempt:1,}" Oct 2 19:07:53.969913 kubelet[2130]: I1002 19:07:53.969839 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bd445fdb4-lwq9k" podStartSLOduration=25.296907123 podCreationTimestamp="2023-10-02 19:07:26 +0000 UTC" firstStartedPulling="2023-10-02 19:07:50.964353017 +0000 UTC m=+45.258790853" lastFinishedPulling="2023-10-02 19:07:53.637255186 +0000 UTC m=+47.931693025" observedRunningTime="2023-10-02 19:07:53.955440823 +0000 UTC m=+48.249878670" watchObservedRunningTime="2023-10-02 19:07:53.969809295 +0000 UTC m=+48.264247139" Oct 2 19:07:54.081823 systemd-networkd[1052]: cali7c1dd39add2: Link UP Oct 2 19:07:54.083232 systemd-networkd[1052]: cali7c1dd39add2: Gained carrier Oct 2 19:07:54.083884 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c1dd39add2: link becomes ready Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:53.982 [INFO][3700] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--fzdbj-eth0 coredns-5d78c9869d- kube-system cd75912f-dd22-46e1-8adf-28b9e6b486d5 695 0 2023-10-02 19:07:21 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-fzdbj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7c1dd39add2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Namespace="kube-system" Pod="coredns-5d78c9869d-fzdbj" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--fzdbj-" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:53.982 [INFO][3700] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Namespace="kube-system" Pod="coredns-5d78c9869d-fzdbj" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.036 [INFO][3734] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" HandleID="k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.057 [INFO][3734] ipam_plugin.go 269: Auto assigning IP ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" HandleID="k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004dfb0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-fzdbj", "timestamp":"2023-10-02 19:07:54.0361421 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:07:54.093548 env[1146]: time="2023-10-02T19:07:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:54.093548 env[1146]: time="2023-10-02T19:07:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.057 [INFO][3734] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.058 [INFO][3734] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" host="localhost" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.062 [INFO][3734] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.065 [INFO][3734] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.066 [INFO][3734] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.067 [INFO][3734] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.067 [INFO][3734] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" host="localhost" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.068 [INFO][3734] ipam.go 1682: Creating new handle: k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16 Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.070 [INFO][3734] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" host="localhost" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.073 [INFO][3734] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" host="localhost" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.073 [INFO][3734] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" host="localhost" Oct 2 19:07:54.093548 env[1146]: time="2023-10-02T19:07:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:54.093548 env[1146]: 2023-10-02 19:07:54.073 [INFO][3734] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" HandleID="k8s-pod-network.8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:54.094084 env[1146]: 2023-10-02 19:07:54.074 [INFO][3700] k8s.go 383: Populated endpoint ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Namespace="kube-system" Pod="coredns-5d78c9869d-fzdbj" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--fzdbj-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cd75912f-dd22-46e1-8adf-28b9e6b486d5", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-fzdbj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7c1dd39add2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:54.094084 env[1146]: 2023-10-02 19:07:54.075 [INFO][3700] k8s.go 384: Calico CNI using IPs: [192.168.88.131/32] ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Namespace="kube-system" Pod="coredns-5d78c9869d-fzdbj" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:54.094084 env[1146]: 2023-10-02 19:07:54.075 [INFO][3700] dataplane_linux.go 68: Setting the host side veth name to cali7c1dd39add2 ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Namespace="kube-system" Pod="coredns-5d78c9869d-fzdbj" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:54.094084 env[1146]: 2023-10-02 19:07:54.075 [INFO][3700] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Namespace="kube-system" Pod="coredns-5d78c9869d-fzdbj" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:54.094084 env[1146]: 2023-10-02 19:07:54.083 [INFO][3700] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Namespace="kube-system" Pod="coredns-5d78c9869d-fzdbj" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--fzdbj-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cd75912f-dd22-46e1-8adf-28b9e6b486d5", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16", Pod:"coredns-5d78c9869d-fzdbj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7c1dd39add2", MAC:"52:92:2a:d5:71:4d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:54.094084 env[1146]: 2023-10-02 19:07:54.092 [INFO][3700] k8s.go 489: Wrote updated endpoint to datastore ContainerID="8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16" Namespace="kube-system" Pod="coredns-5d78c9869d-fzdbj" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:07:54.102162 env[1146]: time="2023-10-02T19:07:54.102103388Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:54.102312 env[1146]: time="2023-10-02T19:07:54.102281270Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:54.102389 env[1146]: time="2023-10-02T19:07:54.102296992Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:54.102565 env[1146]: time="2023-10-02T19:07:54.102534986Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16 pid=3761 runtime=io.containerd.runc.v2 Oct 2 19:07:54.111555 systemd[1]: Started cri-containerd-8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16.scope. Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.121000 audit: BPF prog-id=161 op=LOAD Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3761 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861613635666562376164343030643339306432613733616263373733 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=3761 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861613635666562376164343030643339306432613733616263373733 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit: BPF prog-id=162 op=LOAD Oct 2 19:07:54.122000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0002489d0 items=0 ppid=3761 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861613635666562376164343030643339306432613733616263373733 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit: BPF prog-id=163 op=LOAD Oct 2 19:07:54.122000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000248a18 items=0 ppid=3761 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861613635666562376164343030643339306432613733616263373733 Oct 2 19:07:54.122000 audit: BPF prog-id=163 op=UNLOAD Oct 2 19:07:54.122000 audit: BPF prog-id=162 op=UNLOAD Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.122000 audit: BPF prog-id=164 op=LOAD Oct 2 19:07:54.122000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000248e28 items=0 ppid=3761 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861613635666562376164343030643339306432613733616263373733 Oct 2 19:07:54.126508 systemd-resolved[1097]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:07:54.157066 env[1146]: time="2023-10-02T19:07:54.157033057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-fzdbj,Uid:cd75912f-dd22-46e1-8adf-28b9e6b486d5,Namespace:kube-system,Attempt:1,} returns sandbox id \"8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16\"" Oct 2 19:07:54.160024 env[1146]: time="2023-10-02T19:07:54.160001921Z" level=info msg="CreateContainer within sandbox \"8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:07:54.171000 audit[3797]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=3797 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:54.171000 audit[3797]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7fffd5a9ec60 a2=0 a3=7fffd5a9ec4c items=0 ppid=3164 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.171000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:54.199294 env[1146]: time="2023-10-02T19:07:54.199264101Z" level=info msg="CreateContainer within sandbox \"8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"507663baa5b24bad9e9bceac7dfe019d8f1845777c73492097525d30b9939569\"" Oct 2 19:07:54.199765 env[1146]: time="2023-10-02T19:07:54.199701488Z" level=info msg="StartContainer for \"507663baa5b24bad9e9bceac7dfe019d8f1845777c73492097525d30b9939569\"" Oct 2 19:07:54.211828 systemd[1]: Started cri-containerd-507663baa5b24bad9e9bceac7dfe019d8f1845777c73492097525d30b9939569.scope. Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.222000 audit: BPF prog-id=165 op=LOAD Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3761 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373636336261613562323462616439653962636561633764666530 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3761 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373636336261613562323462616439653962636561633764666530 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.223000 audit: BPF prog-id=166 op=LOAD Oct 2 19:07:54.223000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ce1f0 items=0 ppid=3761 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373636336261613562323462616439653962636561633764666530 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.225000 audit: BPF prog-id=167 op=LOAD Oct 2 19:07:54.225000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ce238 items=0 ppid=3761 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373636336261613562323462616439653962636561633764666530 Oct 2 19:07:54.226000 audit: BPF prog-id=167 op=UNLOAD Oct 2 19:07:54.226000 audit: BPF prog-id=166 op=UNLOAD Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit[3805]: AVC avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.226000 audit: BPF prog-id=168 op=LOAD Oct 2 19:07:54.226000 audit[3805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ce648 items=0 ppid=3761 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530373636336261613562323462616439653962636561633764666530 Oct 2 19:07:54.238010 env[1146]: time="2023-10-02T19:07:54.237973155Z" level=info msg="StartContainer for \"507663baa5b24bad9e9bceac7dfe019d8f1845777c73492097525d30b9939569\" returns successfully" Oct 2 19:07:54.657830 systemd[1]: run-netns-cni\x2d8401f983\x2dcbbf\x2dbf76\x2d5a0a\x2d23425e80d8a8.mount: Deactivated successfully. Oct 2 19:07:54.777826 env[1146]: time="2023-10-02T19:07:54.777761164Z" level=info msg="StopPodSandbox for \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\"" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.876 [INFO][3848] k8s.go 576: Cleaning up netns ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.876 [INFO][3848] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" iface="eth0" netns="/var/run/netns/cni-ef1606cc-22e4-50df-4700-9a2f8f7553a6" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.876 [INFO][3848] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" iface="eth0" netns="/var/run/netns/cni-ef1606cc-22e4-50df-4700-9a2f8f7553a6" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.876 [INFO][3848] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" iface="eth0" netns="/var/run/netns/cni-ef1606cc-22e4-50df-4700-9a2f8f7553a6" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.877 [INFO][3848] k8s.go 583: Releasing IP address(es) ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.877 [INFO][3848] utils.go 196: Calico CNI releasing IP address ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.892 [INFO][3854] ipam_plugin.go 416: Releasing address using handleID ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:54.899138 env[1146]: time="2023-10-02T19:07:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:54.899138 env[1146]: time="2023-10-02T19:07:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.896 [WARNING][3854] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.896 [INFO][3854] ipam_plugin.go 444: Releasing address using workloadID ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:54.899138 env[1146]: time="2023-10-02T19:07:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:54.899138 env[1146]: 2023-10-02 19:07:54.898 [INFO][3848] k8s.go 589: Teardown processing complete. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:07:54.901126 env[1146]: time="2023-10-02T19:07:54.900523834Z" level=info msg="TearDown network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\" successfully" Oct 2 19:07:54.901126 env[1146]: time="2023-10-02T19:07:54.900545515Z" level=info msg="StopPodSandbox for \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\" returns successfully" Oct 2 19:07:54.900296 systemd[1]: run-netns-cni\x2def1606cc\x2d22e4\x2d50df\x2d4700\x2d9a2f8f7553a6.mount: Deactivated successfully. Oct 2 19:07:54.901647 env[1146]: time="2023-10-02T19:07:54.901630098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-m9qt9,Uid:bd4a7736-8907-4f4a-8461-cde577053849,Namespace:kube-system,Attempt:1,}" Oct 2 19:07:54.925793 kubelet[2130]: I1002 19:07:54.925151 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-fzdbj" podStartSLOduration=33.925124817 podCreationTimestamp="2023-10-02 19:07:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:54.925096498 +0000 UTC m=+49.219534364" watchObservedRunningTime="2023-10-02 19:07:54.925124817 +0000 UTC m=+49.219562661" Oct 2 19:07:54.998000 audit[3880]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:54.998000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffda01e0810 a2=0 a3=7ffda01e07fc items=0 ppid=2297 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:54.998000 audit[3880]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:54.998000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffda01e0810 a2=0 a3=31030 items=0 ppid=2297 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:55.010889 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib098b936dd5: link becomes ready Oct 2 19:07:55.020000 audit[3883]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:55.020000 audit[3883]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe529492f0 a2=0 a3=7ffe529492dc items=0 ppid=2297 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:55.023000 audit[3883]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:55.023000 audit[3883]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe529492f0 a2=0 a3=7ffe529492dc items=0 ppid=2297 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.023000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:55.042817 systemd-networkd[1052]: calib098b936dd5: Link UP Oct 2 19:07:55.042821 systemd-networkd[1052]: calib098b936dd5: Gained carrier Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.941 [INFO][3860] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--m9qt9-eth0 coredns-5d78c9869d- kube-system bd4a7736-8907-4f4a-8461-cde577053849 716 0 2023-10-02 19:07:21 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-m9qt9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib098b936dd5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Namespace="kube-system" Pod="coredns-5d78c9869d-m9qt9" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--m9qt9-" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.942 [INFO][3860] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Namespace="kube-system" Pod="coredns-5d78c9869d-m9qt9" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.986 [INFO][3873] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" HandleID="k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.991 [INFO][3873] ipam_plugin.go 269: Auto assigning IP ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" HandleID="k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004db10), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-m9qt9", "timestamp":"2023-10-02 19:07:54.986552593 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:07:55.102351 env[1146]: time="2023-10-02T19:07:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:55.102351 env[1146]: time="2023-10-02T19:07:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.991 [INFO][3873] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.992 [INFO][3873] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" host="localhost" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.993 [INFO][3873] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.997 [INFO][3873] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:54.999 [INFO][3873] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:55.000 [INFO][3873] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:55.000 [INFO][3873] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" host="localhost" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:55.001 [INFO][3873] ipam.go 1682: Creating new handle: k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:55.003 [INFO][3873] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" host="localhost" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:55.007 [INFO][3873] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" host="localhost" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:55.007 [INFO][3873] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" host="localhost" Oct 2 19:07:55.102351 env[1146]: time="2023-10-02T19:07:55Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:55.102351 env[1146]: 2023-10-02 19:07:55.007 [INFO][3873] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" HandleID="k8s-pod-network.0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:55.102903 env[1146]: 2023-10-02 19:07:55.008 [INFO][3860] k8s.go 383: Populated endpoint ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Namespace="kube-system" Pod="coredns-5d78c9869d-m9qt9" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--m9qt9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bd4a7736-8907-4f4a-8461-cde577053849", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-m9qt9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib098b936dd5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:55.102903 env[1146]: 2023-10-02 19:07:55.008 [INFO][3860] k8s.go 384: Calico CNI using IPs: [192.168.88.132/32] ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Namespace="kube-system" Pod="coredns-5d78c9869d-m9qt9" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:55.102903 env[1146]: 2023-10-02 19:07:55.008 [INFO][3860] dataplane_linux.go 68: Setting the host side veth name to calib098b936dd5 ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Namespace="kube-system" Pod="coredns-5d78c9869d-m9qt9" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:55.102903 env[1146]: 2023-10-02 19:07:55.010 [INFO][3860] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Namespace="kube-system" Pod="coredns-5d78c9869d-m9qt9" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:55.102903 env[1146]: 2023-10-02 19:07:55.051 [INFO][3860] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Namespace="kube-system" Pod="coredns-5d78c9869d-m9qt9" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--m9qt9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bd4a7736-8907-4f4a-8461-cde577053849", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e", Pod:"coredns-5d78c9869d-m9qt9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib098b936dd5", MAC:"c6:bd:ee:d2:12:c4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:55.102903 env[1146]: 2023-10-02 19:07:55.100 [INFO][3860] k8s.go 489: Wrote updated endpoint to datastore ContainerID="0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e" Namespace="kube-system" Pod="coredns-5d78c9869d-m9qt9" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:07:55.117522 env[1146]: time="2023-10-02T19:07:55.117003796Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:55.117522 env[1146]: time="2023-10-02T19:07:55.117030490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:55.117522 env[1146]: time="2023-10-02T19:07:55.117041735Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:55.117522 env[1146]: time="2023-10-02T19:07:55.117109645Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e pid=3904 runtime=io.containerd.runc.v2 Oct 2 19:07:55.127850 systemd[1]: Started cri-containerd-0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e.scope. Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.140000 audit: BPF prog-id=169 op=LOAD Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323438656335343330346438303637663431666261333233393833 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323438656335343330346438303637663431666261333233393833 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.141000 audit: BPF prog-id=170 op=LOAD Oct 2 19:07:55.141000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028a340 items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323438656335343330346438303637663431666261333233393833 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.142000 audit: BPF prog-id=171 op=LOAD Oct 2 19:07:55.142000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028a388 items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323438656335343330346438303637663431666261333233393833 Oct 2 19:07:55.143000 audit: BPF prog-id=171 op=UNLOAD Oct 2 19:07:55.143000 audit: BPF prog-id=170 op=UNLOAD Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.143000 audit: BPF prog-id=172 op=LOAD Oct 2 19:07:55.143000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028a798 items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062323438656335343330346438303637663431666261333233393833 Oct 2 19:07:55.145128 systemd-resolved[1097]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:07:55.151000 audit[3931]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:55.151000 audit[3931]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7fff9aa90b90 a2=0 a3=7fff9aa90b7c items=0 ppid=3164 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.151000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:55.173153 env[1146]: time="2023-10-02T19:07:55.173128023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-m9qt9,Uid:bd4a7736-8907-4f4a-8461-cde577053849,Namespace:kube-system,Attempt:1,} returns sandbox id \"0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e\"" Oct 2 19:07:55.180828 env[1146]: time="2023-10-02T19:07:55.177606442Z" level=info msg="CreateContainer within sandbox \"0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:07:55.190739 env[1146]: time="2023-10-02T19:07:55.190710695Z" level=info msg="CreateContainer within sandbox \"0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"cde1dbb859177d9472c12817ac4731a892996ea60862ba95661fdec1e6c7affb\"" Oct 2 19:07:55.191333 env[1146]: time="2023-10-02T19:07:55.191319691Z" level=info msg="StartContainer for \"cde1dbb859177d9472c12817ac4731a892996ea60862ba95661fdec1e6c7affb\"" Oct 2 19:07:55.203996 systemd[1]: Started cri-containerd-cde1dbb859177d9472c12817ac4731a892996ea60862ba95661fdec1e6c7affb.scope. Oct 2 19:07:55.216948 kernel: kauditd_printk_skb: 356 callbacks suppressed Oct 2 19:07:55.217017 kernel: audit: type=1400 audit(1696273675.213:1287): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.217076 kernel: audit: type=1400 audit(1696273675.213:1288): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.221931 kernel: audit: type=1400 audit(1696273675.213:1289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.221962 kernel: audit: type=1400 audit(1696273675.213:1290): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.228876 kernel: audit: type=1400 audit(1696273675.213:1291): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.234991 kernel: audit: type=1400 audit(1696273675.213:1292): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.235041 kernel: audit: type=1400 audit(1696273675.213:1293): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.235059 kernel: audit: type=1400 audit(1696273675.213:1294): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.242144 kernel: audit: type=1400 audit(1696273675.213:1295): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.242177 kernel: audit: type=1400 audit(1696273675.216:1296): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit: BPF prog-id=173 op=LOAD Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3904 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364653164626238353931373764393437326331323831376163343733 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3904 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364653164626238353931373764393437326331323831376163343733 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.216000 audit: BPF prog-id=174 op=LOAD Oct 2 19:07:55.216000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000298770 items=0 ppid=3904 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364653164626238353931373764393437326331323831376163343733 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.218000 audit: BPF prog-id=175 op=LOAD Oct 2 19:07:55.218000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002987b8 items=0 ppid=3904 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364653164626238353931373764393437326331323831376163343733 Oct 2 19:07:55.223000 audit: BPF prog-id=175 op=UNLOAD Oct 2 19:07:55.223000 audit: BPF prog-id=174 op=UNLOAD Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { perfmon } for pid=3946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit[3946]: AVC avc: denied { bpf } for pid=3946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.223000 audit: BPF prog-id=176 op=LOAD Oct 2 19:07:55.223000 audit[3946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000298bc8 items=0 ppid=3904 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364653164626238353931373764393437326331323831376163343733 Oct 2 19:07:55.257001 env[1146]: time="2023-10-02T19:07:55.256975413Z" level=info msg="StartContainer for \"cde1dbb859177d9472c12817ac4731a892996ea60862ba95661fdec1e6c7affb\" returns successfully" Oct 2 19:07:55.574005 systemd-networkd[1052]: cali7c1dd39add2: Gained IPv6LL Oct 2 19:07:55.635619 kubelet[2130]: I1002 19:07:55.635559 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:55.639613 systemd[1]: Created slice kubepods-besteffort-pod362b53f9_659f_4dcc_b76b_392a51c2d801.slice. Oct 2 19:07:55.640707 kubelet[2130]: I1002 19:07:55.640613 2130 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:07:55.643242 systemd[1]: Created slice kubepods-besteffort-pod1d4630ec_27ca_4875_8a11_552d76b5bbed.slice. Oct 2 19:07:55.714077 kubelet[2130]: I1002 19:07:55.714054 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dh599\" (UniqueName: \"kubernetes.io/projected/1d4630ec-27ca-4875-8a11-552d76b5bbed-kube-api-access-dh599\") pod \"calico-apiserver-58545cdf6-8bqbr\" (UID: \"1d4630ec-27ca-4875-8a11-552d76b5bbed\") " pod="calico-apiserver/calico-apiserver-58545cdf6-8bqbr" Oct 2 19:07:55.714506 kubelet[2130]: I1002 19:07:55.714398 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/362b53f9-659f-4dcc-b76b-392a51c2d801-calico-apiserver-certs\") pod \"calico-apiserver-58545cdf6-2kb9z\" (UID: \"362b53f9-659f-4dcc-b76b-392a51c2d801\") " pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" Oct 2 19:07:55.714506 kubelet[2130]: I1002 19:07:55.714452 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1d4630ec-27ca-4875-8a11-552d76b5bbed-calico-apiserver-certs\") pod \"calico-apiserver-58545cdf6-8bqbr\" (UID: \"1d4630ec-27ca-4875-8a11-552d76b5bbed\") " pod="calico-apiserver/calico-apiserver-58545cdf6-8bqbr" Oct 2 19:07:55.714506 kubelet[2130]: I1002 19:07:55.714473 2130 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qtqss\" (UniqueName: \"kubernetes.io/projected/362b53f9-659f-4dcc-b76b-392a51c2d801-kube-api-access-qtqss\") pod \"calico-apiserver-58545cdf6-2kb9z\" (UID: \"362b53f9-659f-4dcc-b76b-392a51c2d801\") " pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" Oct 2 19:07:55.931952 kubelet[2130]: I1002 19:07:55.931890 2130 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-m9qt9" podStartSLOduration=34.931869946 podCreationTimestamp="2023-10-02 19:07:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:07:55.931762309 +0000 UTC m=+50.226200157" watchObservedRunningTime="2023-10-02 19:07:55.931869946 +0000 UTC m=+50.226307795" Oct 2 19:07:55.942452 env[1146]: time="2023-10-02T19:07:55.942426612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58545cdf6-2kb9z,Uid:362b53f9-659f-4dcc-b76b-392a51c2d801,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:07:55.945596 env[1146]: time="2023-10-02T19:07:55.945556852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58545cdf6-8bqbr,Uid:1d4630ec-27ca-4875-8a11-552d76b5bbed,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:07:55.945000 audit[3979]: NETFILTER_CFG table=filter:109 family=2 entries=9 op=nft_register_rule pid=3979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:55.945000 audit[3979]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdcd656000 a2=0 a3=7ffdcd655fec items=0 ppid=2297 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:55.947000 audit[3979]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:55.947000 audit[3979]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdcd656000 a2=0 a3=7ffdcd655fec items=0 ppid=2297 pid=3979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:56.170957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:07:56.171095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6ef9bfb8137: link becomes ready Oct 2 19:07:56.179204 systemd-networkd[1052]: cali6ef9bfb8137: Link UP Oct 2 19:07:56.179208 systemd-networkd[1052]: cali6ef9bfb8137: Gained carrier Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.088 [INFO][3980] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0 calico-apiserver-58545cdf6- calico-apiserver 362b53f9-659f-4dcc-b76b-392a51c2d801 775 0 2023-10-02 19:07:55 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58545cdf6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-58545cdf6-2kb9z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6ef9bfb8137 [] []}} ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-2kb9z" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.088 [INFO][3980] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-2kb9z" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.120 [INFO][4005] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" HandleID="k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Workload="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.127 [INFO][4005] ipam_plugin.go 269: Auto assigning IP ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" HandleID="k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Workload="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001b97f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-58545cdf6-2kb9z", "timestamp":"2023-10-02 19:07:56.120930318 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:07:56.205343 env[1146]: time="2023-10-02T19:07:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:56.205343 env[1146]: time="2023-10-02T19:07:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.128 [INFO][4005] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.129 [INFO][4005] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" host="localhost" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.134 [INFO][4005] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.136 [INFO][4005] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.138 [INFO][4005] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.139 [INFO][4005] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.139 [INFO][4005] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" host="localhost" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.140 [INFO][4005] ipam.go 1682: Creating new handle: k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.156 [INFO][4005] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" host="localhost" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.163 [INFO][4005] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" host="localhost" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.163 [INFO][4005] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" host="localhost" Oct 2 19:07:56.205343 env[1146]: time="2023-10-02T19:07:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:56.205343 env[1146]: 2023-10-02 19:07:56.164 [INFO][4005] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" HandleID="k8s-pod-network.b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Workload="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" Oct 2 19:07:56.205981 env[1146]: 2023-10-02 19:07:56.166 [INFO][3980] k8s.go 383: Populated endpoint ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-2kb9z" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0", GenerateName:"calico-apiserver-58545cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"362b53f9-659f-4dcc-b76b-392a51c2d801", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58545cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-58545cdf6-2kb9z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6ef9bfb8137", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:56.205981 env[1146]: 2023-10-02 19:07:56.166 [INFO][3980] k8s.go 384: Calico CNI using IPs: [192.168.88.133/32] ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-2kb9z" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" Oct 2 19:07:56.205981 env[1146]: 2023-10-02 19:07:56.166 [INFO][3980] dataplane_linux.go 68: Setting the host side veth name to cali6ef9bfb8137 ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-2kb9z" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" Oct 2 19:07:56.205981 env[1146]: 2023-10-02 19:07:56.171 [INFO][3980] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-2kb9z" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" Oct 2 19:07:56.205981 env[1146]: 2023-10-02 19:07:56.179 [INFO][3980] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-2kb9z" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0", GenerateName:"calico-apiserver-58545cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"362b53f9-659f-4dcc-b76b-392a51c2d801", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58545cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa", Pod:"calico-apiserver-58545cdf6-2kb9z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6ef9bfb8137", MAC:"36:c5:b6:91:12:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:56.205981 env[1146]: 2023-10-02 19:07:56.204 [INFO][3980] k8s.go 489: Wrote updated endpoint to datastore ContainerID="b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-2kb9z" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--2kb9z-eth0" Oct 2 19:07:56.244817 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidba7124db52: link becomes ready Oct 2 19:07:56.253067 systemd-networkd[1052]: calidba7124db52: Link UP Oct 2 19:07:56.253072 systemd-networkd[1052]: calidba7124db52: Gained carrier Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.088 [INFO][3987] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0 calico-apiserver-58545cdf6- calico-apiserver 1d4630ec-27ca-4875-8a11-552d76b5bbed 776 0 2023-10-02 19:07:55 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58545cdf6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-58545cdf6-8bqbr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidba7124db52 [] []}} ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-8bqbr" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.088 [INFO][3987] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-8bqbr" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.129 [INFO][4006] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" HandleID="k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Workload="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.141 [INFO][4006] ipam_plugin.go 269: Auto assigning IP ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" HandleID="k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Workload="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000421eb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-58545cdf6-8bqbr", "timestamp":"2023-10-02 19:07:56.129191054 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:07:56.274070 env[1146]: time="2023-10-02T19:07:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:07:56.274070 env[1146]: time="2023-10-02T19:07:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.164 [INFO][4006] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.166 [INFO][4006] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" host="localhost" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.172 [INFO][4006] ipam.go 372: Looking up existing affinities for host host="localhost" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.175 [INFO][4006] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.180 [INFO][4006] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.187 [INFO][4006] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.187 [INFO][4006] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" host="localhost" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.203 [INFO][4006] ipam.go 1682: Creating new handle: k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296 Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.218 [INFO][4006] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" host="localhost" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.241 [INFO][4006] ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" host="localhost" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.241 [INFO][4006] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" host="localhost" Oct 2 19:07:56.274070 env[1146]: time="2023-10-02T19:07:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:07:56.274070 env[1146]: 2023-10-02 19:07:56.241 [INFO][4006] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" HandleID="k8s-pod-network.074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Workload="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" Oct 2 19:07:56.298220 env[1146]: 2023-10-02 19:07:56.242 [INFO][3987] k8s.go 383: Populated endpoint ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-8bqbr" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0", GenerateName:"calico-apiserver-58545cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"1d4630ec-27ca-4875-8a11-552d76b5bbed", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58545cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-58545cdf6-8bqbr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidba7124db52", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:56.298220 env[1146]: 2023-10-02 19:07:56.242 [INFO][3987] k8s.go 384: Calico CNI using IPs: [192.168.88.134/32] ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-8bqbr" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" Oct 2 19:07:56.298220 env[1146]: 2023-10-02 19:07:56.242 [INFO][3987] dataplane_linux.go 68: Setting the host side veth name to calidba7124db52 ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-8bqbr" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" Oct 2 19:07:56.298220 env[1146]: 2023-10-02 19:07:56.244 [INFO][3987] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-8bqbr" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" Oct 2 19:07:56.298220 env[1146]: 2023-10-02 19:07:56.261 [INFO][3987] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-8bqbr" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0", GenerateName:"calico-apiserver-58545cdf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"1d4630ec-27ca-4875-8a11-552d76b5bbed", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58545cdf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296", Pod:"calico-apiserver-58545cdf6-8bqbr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidba7124db52", MAC:"ae:61:0c:e3:2b:38", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:07:56.298220 env[1146]: 2023-10-02 19:07:56.272 [INFO][3987] k8s.go 489: Wrote updated endpoint to datastore ContainerID="074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296" Namespace="calico-apiserver" Pod="calico-apiserver-58545cdf6-8bqbr" WorkloadEndpoint="localhost-k8s-calico--apiserver--58545cdf6--8bqbr-eth0" Oct 2 19:07:56.278966 systemd-networkd[1052]: calib098b936dd5: Gained IPv6LL Oct 2 19:07:56.325432 env[1146]: time="2023-10-02T19:07:56.324656783Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:56.325432 env[1146]: time="2023-10-02T19:07:56.324708194Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:56.325432 env[1146]: time="2023-10-02T19:07:56.324731574Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:56.325432 env[1146]: time="2023-10-02T19:07:56.324849728Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296 pid=4081 runtime=io.containerd.runc.v2 Oct 2 19:07:56.326120 env[1146]: time="2023-10-02T19:07:56.323457433Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:56.326120 env[1146]: time="2023-10-02T19:07:56.325878564Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:56.326120 env[1146]: time="2023-10-02T19:07:56.325886567Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:56.326120 env[1146]: time="2023-10-02T19:07:56.325960351Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa pid=4084 runtime=io.containerd.runc.v2 Oct 2 19:07:56.325000 audit[4064]: NETFILTER_CFG table=filter:111 family=2 entries=65 op=nft_register_chain pid=4064 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:56.325000 audit[4064]: SYSCALL arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7fff0e177ed0 a2=0 a3=7fff0e177ebc items=0 ppid=3164 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.325000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:56.343936 systemd[1]: Started cri-containerd-b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa.scope. Oct 2 19:07:56.347289 systemd[1]: Started cri-containerd-074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296.scope. Oct 2 19:07:56.376000 audit[4135]: NETFILTER_CFG table=filter:112 family=2 entries=46 op=nft_register_chain pid=4135 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:07:56.376000 audit[4135]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7ffd7a98eb70 a2=0 a3=7ffd7a98eb5c items=0 ppid=3164 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.376000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit: BPF prog-id=177 op=LOAD Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4084 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653332383163346662333834313465353963363262333738313466 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4084 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653332383163346662333834313465353963363262333738313466 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit: BPF prog-id=178 op=LOAD Oct 2 19:07:56.379000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000285450 items=0 ppid=4084 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653332383163346662333834313465353963363262333738313466 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit: BPF prog-id=179 op=LOAD Oct 2 19:07:56.379000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000285498 items=0 ppid=4084 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653332383163346662333834313465353963363262333738313466 Oct 2 19:07:56.379000 audit: BPF prog-id=179 op=UNLOAD Oct 2 19:07:56.379000 audit: BPF prog-id=178 op=UNLOAD Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.379000 audit: BPF prog-id=180 op=LOAD Oct 2 19:07:56.379000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002858a8 items=0 ppid=4084 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653332383163346662333834313465353963363262333738313466 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit: BPF prog-id=181 op=LOAD Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4081 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346664663661386264353464613235646230353564383733343861 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4081 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346664663661386264353464613235646230353564383733343861 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit: BPF prog-id=182 op=LOAD Oct 2 19:07:56.383000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024520 items=0 ppid=4081 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346664663661386264353464613235646230353564383733343861 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit: BPF prog-id=183 op=LOAD Oct 2 19:07:56.383000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024568 items=0 ppid=4081 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346664663661386264353464613235646230353564383733343861 Oct 2 19:07:56.383000 audit: BPF prog-id=183 op=UNLOAD Oct 2 19:07:56.383000 audit: BPF prog-id=182 op=UNLOAD Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.383000 audit: BPF prog-id=184 op=LOAD Oct 2 19:07:56.383000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024978 items=0 ppid=4081 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346664663661386264353464613235646230353564383733343861 Oct 2 19:07:56.383440 systemd-resolved[1097]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:07:56.451131 env[1146]: time="2023-10-02T19:07:56.435228266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58545cdf6-2kb9z,Uid:362b53f9-659f-4dcc-b76b-392a51c2d801,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b8e3281c4fb38414e59c62b37814f8289131cd5796e58d7e413de009dbb4ccaa\"" Oct 2 19:07:56.451131 env[1146]: time="2023-10-02T19:07:56.439676501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58545cdf6-8bqbr,Uid:1d4630ec-27ca-4875-8a11-552d76b5bbed,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"074fdf6a8bd54da25db055d87348aa41b62459e26ecd95619cf3b63917704296\"" Oct 2 19:07:56.451131 env[1146]: time="2023-10-02T19:07:56.443979401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:07:56.393273 systemd-resolved[1097]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Oct 2 19:07:56.683895 env[1146]: time="2023-10-02T19:07:56.683844709Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:07:56.694732 env[1146]: time="2023-10-02T19:07:56.694695223Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:07:56.694920 kubelet[2130]: E1002 19:07:56.694909 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:07:56.695201 kubelet[2130]: E1002 19:07:56.694938 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:07:56.695201 kubelet[2130]: E1002 19:07:56.695103 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qtqss,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-58545cdf6-2kb9z_calico-apiserver(362b53f9-659f-4dcc-b76b-392a51c2d801): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:07:56.695201 kubelet[2130]: E1002 19:07:56.695138 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" podUID=362b53f9-659f-4dcc-b76b-392a51c2d801 Oct 2 19:07:56.695505 env[1146]: time="2023-10-02T19:07:56.695484112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:07:56.922926 kubelet[2130]: E1002 19:07:56.922774 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" podUID=362b53f9-659f-4dcc-b76b-392a51c2d801 Oct 2 19:07:56.943000 audit[4154]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:56.943000 audit[4154]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcba88a3b0 a2=0 a3=7ffcba88a39c items=0 ppid=2297 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:56.950000 audit[4154]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:56.950000 audit[4154]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffcba88a3b0 a2=0 a3=7ffcba88a39c items=0 ppid=2297 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:56.971179 env[1146]: time="2023-10-02T19:07:56.971134659Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:07:56.971474 env[1146]: time="2023-10-02T19:07:56.971451735Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:07:56.971628 kubelet[2130]: E1002 19:07:56.971611 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:07:56.971671 kubelet[2130]: E1002 19:07:56.971644 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:07:56.971749 kubelet[2130]: E1002 19:07:56.971733 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dh599,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-58545cdf6-8bqbr_calico-apiserver(1d4630ec-27ca-4875-8a11-552d76b5bbed): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:07:56.971866 kubelet[2130]: E1002 19:07:56.971781 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-58545cdf6-8bqbr" podUID=1d4630ec-27ca-4875-8a11-552d76b5bbed Oct 2 19:07:57.622069 systemd-networkd[1052]: cali6ef9bfb8137: Gained IPv6LL Oct 2 19:07:57.686009 systemd-networkd[1052]: calidba7124db52: Gained IPv6LL Oct 2 19:07:57.925466 kubelet[2130]: E1002 19:07:57.925403 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" podUID=362b53f9-659f-4dcc-b76b-392a51c2d801 Oct 2 19:07:57.925714 kubelet[2130]: E1002 19:07:57.925596 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-58545cdf6-8bqbr" podUID=1d4630ec-27ca-4875-8a11-552d76b5bbed Oct 2 19:07:57.961000 audit[4159]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:57.961000 audit[4159]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe7b3720e0 a2=0 a3=7ffe7b3720cc items=0 ppid=2297 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:57.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:57.964000 audit[4159]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:07:57.964000 audit[4159]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe7b3720e0 a2=0 a3=7ffe7b3720cc items=0 ppid=2297 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:57.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:07:58.331344 systemd[1]: run-containerd-runc-k8s.io-de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc-runc.7RjTiw.mount: Deactivated successfully. Oct 2 19:08:02.040000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.044739 kernel: kauditd_printk_skb: 185 callbacks suppressed Oct 2 19:08:02.044814 kernel: audit: type=1400 audit(1696273682.040:1349): avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.040000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.052886 kernel: audit: type=1400 audit(1696273682.040:1350): avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.052940 kernel: audit: type=1300 audit(1696273682.040:1350): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264bb90 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:02.040000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264bb90 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:02.061191 kernel: audit: type=1327 audit(1696273682.040:1350): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:02.061267 kernel: audit: type=1300 audit(1696273682.040:1349): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b04120 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:02.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:02.040000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b04120 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:02.065459 kernel: audit: type=1327 audit(1696273682.040:1349): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:02.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:02.715000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.715000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.724041 kernel: audit: type=1400 audit(1696273682.715:1351): avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.724113 kernel: audit: type=1400 audit(1696273682.715:1352): avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.715000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c011ff6360 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:08:02.729332 kernel: audit: type=1300 audit(1696273682.715:1352): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c011ff6360 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:08:02.729384 kernel: audit: type=1327 audit(1696273682.715:1352): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:08:02.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:08:02.715000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0102343f0 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:08:02.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:08:02.723000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.723000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00e83bb60 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:08:02.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:08:02.723000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.723000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c010234420 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:08:02.723000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:08:02.752000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.752000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00e83bba0 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:08:02.752000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:08:02.752000 audit[2005]: AVC avc: denied { watch } for pid=2005 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6827 scontext=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.752000 audit[2005]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c010234570 a2=fc6 a3=0 items=0 ppid=1841 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c795,c988 key=(null) Oct 2 19:08:02.752000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313037002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 19:08:05.860772 env[1146]: time="2023-10-02T19:08:05.860563370Z" level=info msg="StopPodSandbox for \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\"" Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:05.984 [WARNING][4209] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rxwsl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"26015d97-edb0-46f0-bac2-de904a2f2b9a", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd", Pod:"csi-node-driver-rxwsl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali64fb9549528", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:05.985 [INFO][4209] k8s.go 576: Cleaning up netns ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:05.985 [INFO][4209] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" iface="eth0" netns="" Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:05.985 [INFO][4209] k8s.go 583: Releasing IP address(es) ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:05.985 [INFO][4209] utils.go 196: Calico CNI releasing IP address ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:06.000 [INFO][4216] ipam_plugin.go 416: Releasing address using handleID ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:08:06.008292 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:06.008292 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:06.005 [WARNING][4216] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:06.005 [INFO][4216] ipam_plugin.go 444: Releasing address using workloadID ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:08:06.008292 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:06.008292 env[1146]: 2023-10-02 19:08:06.007 [INFO][4209] k8s.go 589: Teardown processing complete. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:08:06.017595 env[1146]: time="2023-10-02T19:08:06.008665090Z" level=info msg="TearDown network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\" successfully" Oct 2 19:08:06.017595 env[1146]: time="2023-10-02T19:08:06.008690069Z" level=info msg="StopPodSandbox for \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\" returns successfully" Oct 2 19:08:06.031017 env[1146]: time="2023-10-02T19:08:06.030988023Z" level=info msg="RemovePodSandbox for \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\"" Oct 2 19:08:06.031062 env[1146]: time="2023-10-02T19:08:06.031021870Z" level=info msg="Forcibly stopping sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\"" Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.055 [WARNING][4235] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rxwsl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"26015d97-edb0-46f0-bac2-de904a2f2b9a", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7a8adee3f8ccb7ab04e30a71ec26a8a91c2c004c39b3c8b5c7bcfc44331d06dd", Pod:"csi-node-driver-rxwsl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali64fb9549528", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.055 [INFO][4235] k8s.go 576: Cleaning up netns ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.055 [INFO][4235] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" iface="eth0" netns="" Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.055 [INFO][4235] k8s.go 583: Releasing IP address(es) ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.055 [INFO][4235] utils.go 196: Calico CNI releasing IP address ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.067 [INFO][4241] ipam_plugin.go 416: Releasing address using handleID ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:08:06.074096 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:06.074096 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.071 [WARNING][4241] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.071 [INFO][4241] ipam_plugin.go 444: Releasing address using workloadID ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" HandleID="k8s-pod-network.66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Workload="localhost-k8s-csi--node--driver--rxwsl-eth0" Oct 2 19:08:06.074096 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:06.074096 env[1146]: 2023-10-02 19:08:06.073 [INFO][4235] k8s.go 589: Teardown processing complete. ContainerID="66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34" Oct 2 19:08:06.074465 env[1146]: time="2023-10-02T19:08:06.074113481Z" level=info msg="TearDown network for sandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\" successfully" Oct 2 19:08:06.089675 env[1146]: time="2023-10-02T19:08:06.089650837Z" level=info msg="RemovePodSandbox \"66d5191fe55d4d5978b67561cf960266b9ba67b9fb41d155d86521b18ae12c34\" returns successfully" Oct 2 19:08:06.090087 env[1146]: time="2023-10-02T19:08:06.090067935Z" level=info msg="StopPodSandbox for \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\"" Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.128 [WARNING][4259] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--m9qt9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bd4a7736-8907-4f4a-8461-cde577053849", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e", Pod:"coredns-5d78c9869d-m9qt9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib098b936dd5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.128 [INFO][4259] k8s.go 576: Cleaning up netns ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.128 [INFO][4259] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" iface="eth0" netns="" Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.128 [INFO][4259] k8s.go 583: Releasing IP address(es) ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.128 [INFO][4259] utils.go 196: Calico CNI releasing IP address ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.144 [INFO][4265] ipam_plugin.go 416: Releasing address using handleID ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:08:06.152413 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:06.152413 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.148 [WARNING][4265] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.148 [INFO][4265] ipam_plugin.go 444: Releasing address using workloadID ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:08:06.152413 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:06.152413 env[1146]: 2023-10-02 19:08:06.150 [INFO][4259] k8s.go 589: Teardown processing complete. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:08:06.157749 env[1146]: time="2023-10-02T19:08:06.153064811Z" level=info msg="TearDown network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\" successfully" Oct 2 19:08:06.157749 env[1146]: time="2023-10-02T19:08:06.153083654Z" level=info msg="StopPodSandbox for \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\" returns successfully" Oct 2 19:08:06.157749 env[1146]: time="2023-10-02T19:08:06.153426574Z" level=info msg="RemovePodSandbox for \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\"" Oct 2 19:08:06.157749 env[1146]: time="2023-10-02T19:08:06.153450143Z" level=info msg="Forcibly stopping sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\"" Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.176 [WARNING][4283] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--m9qt9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bd4a7736-8907-4f4a-8461-cde577053849", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0b248ec54304d8067f41fba3239830dbc19dfee8cd6c562cd436555c027a011e", Pod:"coredns-5d78c9869d-m9qt9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib098b936dd5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.176 [INFO][4283] k8s.go 576: Cleaning up netns ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.176 [INFO][4283] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" iface="eth0" netns="" Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.176 [INFO][4283] k8s.go 583: Releasing IP address(es) ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.176 [INFO][4283] utils.go 196: Calico CNI releasing IP address ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.193 [INFO][4290] ipam_plugin.go 416: Releasing address using handleID ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:08:06.200980 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:06.200980 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.197 [WARNING][4290] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.197 [INFO][4290] ipam_plugin.go 444: Releasing address using workloadID ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" HandleID="k8s-pod-network.414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Workload="localhost-k8s-coredns--5d78c9869d--m9qt9-eth0" Oct 2 19:08:06.200980 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:06.200980 env[1146]: 2023-10-02 19:08:06.200 [INFO][4283] k8s.go 589: Teardown processing complete. ContainerID="414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a" Oct 2 19:08:06.201423 env[1146]: time="2023-10-02T19:08:06.201006331Z" level=info msg="TearDown network for sandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\" successfully" Oct 2 19:08:06.202374 env[1146]: time="2023-10-02T19:08:06.202356887Z" level=info msg="RemovePodSandbox \"414b9adaa508b7402b6a26516ec560f80dd97765a591f64b663fbd898386c22a\" returns successfully" Oct 2 19:08:06.202747 env[1146]: time="2023-10-02T19:08:06.202735144Z" level=info msg="StopPodSandbox for \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\"" Oct 2 19:08:06.237777 systemd[1]: run-containerd-runc-k8s.io-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d-runc.297Npn.mount: Deactivated successfully. Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.227 [WARNING][4308] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--fzdbj-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cd75912f-dd22-46e1-8adf-28b9e6b486d5", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16", Pod:"coredns-5d78c9869d-fzdbj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7c1dd39add2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.228 [INFO][4308] k8s.go 576: Cleaning up netns ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.228 [INFO][4308] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" iface="eth0" netns="" Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.228 [INFO][4308] k8s.go 583: Releasing IP address(es) ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.228 [INFO][4308] utils.go 196: Calico CNI releasing IP address ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.256 [INFO][4315] ipam_plugin.go 416: Releasing address using handleID ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:08:06.263851 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:06.263851 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.260 [WARNING][4315] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.260 [INFO][4315] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:08:06.263851 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:06.263851 env[1146]: 2023-10-02 19:08:06.262 [INFO][4308] k8s.go 589: Teardown processing complete. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:08:06.264194 env[1146]: time="2023-10-02T19:08:06.263872967Z" level=info msg="TearDown network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\" successfully" Oct 2 19:08:06.264194 env[1146]: time="2023-10-02T19:08:06.263893576Z" level=info msg="StopPodSandbox for \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\" returns successfully" Oct 2 19:08:06.271626 env[1146]: time="2023-10-02T19:08:06.264581002Z" level=info msg="RemovePodSandbox for \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\"" Oct 2 19:08:06.271626 env[1146]: time="2023-10-02T19:08:06.264600024Z" level=info msg="Forcibly stopping sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\"" Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.328 [WARNING][4352] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--fzdbj-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cd75912f-dd22-46e1-8adf-28b9e6b486d5", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8aa65feb7ad400d390d2a73abc77352e39bf35516101db1c0375b4a5a3f21a16", Pod:"coredns-5d78c9869d-fzdbj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7c1dd39add2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.328 [INFO][4352] k8s.go 576: Cleaning up netns ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.328 [INFO][4352] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" iface="eth0" netns="" Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.328 [INFO][4352] k8s.go 583: Releasing IP address(es) ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.328 [INFO][4352] utils.go 196: Calico CNI releasing IP address ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.342 [INFO][4361] ipam_plugin.go 416: Releasing address using handleID ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:08:06.348987 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:06.348987 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.346 [WARNING][4361] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.346 [INFO][4361] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" HandleID="k8s-pod-network.e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Workload="localhost-k8s-coredns--5d78c9869d--fzdbj-eth0" Oct 2 19:08:06.348987 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:06.348987 env[1146]: 2023-10-02 19:08:06.347 [INFO][4352] k8s.go 589: Teardown processing complete. ContainerID="e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716" Oct 2 19:08:06.349405 env[1146]: time="2023-10-02T19:08:06.349001258Z" level=info msg="TearDown network for sandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\" successfully" Oct 2 19:08:06.379126 env[1146]: time="2023-10-02T19:08:06.379091408Z" level=info msg="RemovePodSandbox \"e3d2363b5be2019c8720c58a68519330ea15770b9a12f59cf729cdb55f5ca716\" returns successfully" Oct 2 19:08:06.379427 env[1146]: time="2023-10-02T19:08:06.379414691Z" level=info msg="StopPodSandbox for \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\"" Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.401 [WARNING][4379] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"5b1a5775-4867-4d7e-8fed-7479d0f2fbd4", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea", Pod:"calico-kube-controllers-7bd445fdb4-lwq9k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali516dc52b1b3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.401 [INFO][4379] k8s.go 576: Cleaning up netns ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.401 [INFO][4379] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" iface="eth0" netns="" Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.401 [INFO][4379] k8s.go 583: Releasing IP address(es) ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.401 [INFO][4379] utils.go 196: Calico CNI releasing IP address ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.416 [INFO][4386] ipam_plugin.go 416: Releasing address using handleID ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:08:06.424904 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:06.424904 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.420 [WARNING][4386] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.420 [INFO][4386] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:08:06.424904 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:06.424904 env[1146]: 2023-10-02 19:08:06.422 [INFO][4379] k8s.go 589: Teardown processing complete. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:08:06.428646 env[1146]: time="2023-10-02T19:08:06.425338675Z" level=info msg="TearDown network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\" successfully" Oct 2 19:08:06.428646 env[1146]: time="2023-10-02T19:08:06.425358955Z" level=info msg="StopPodSandbox for \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\" returns successfully" Oct 2 19:08:06.428646 env[1146]: time="2023-10-02T19:08:06.425730875Z" level=info msg="RemovePodSandbox for \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\"" Oct 2 19:08:06.428646 env[1146]: time="2023-10-02T19:08:06.425769086Z" level=info msg="Forcibly stopping sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\"" Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.463 [WARNING][4406] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"5b1a5775-4867-4d7e-8fed-7479d0f2fbd4", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"828482ba3e18cf566e65bc9db8f4471193abb8f5fdbb6cba562c975806a884ea", Pod:"calico-kube-controllers-7bd445fdb4-lwq9k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali516dc52b1b3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.463 [INFO][4406] k8s.go 576: Cleaning up netns ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.463 [INFO][4406] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" iface="eth0" netns="" Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.463 [INFO][4406] k8s.go 583: Releasing IP address(es) ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.463 [INFO][4406] utils.go 196: Calico CNI releasing IP address ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.479 [INFO][4413] ipam_plugin.go 416: Releasing address using handleID ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:08:06.487205 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:06.487205 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.483 [WARNING][4413] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.483 [INFO][4413] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" HandleID="k8s-pod-network.3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Workload="localhost-k8s-calico--kube--controllers--7bd445fdb4--lwq9k-eth0" Oct 2 19:08:06.487205 env[1146]: time="2023-10-02T19:08:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:06.487205 env[1146]: 2023-10-02 19:08:06.485 [INFO][4406] k8s.go 589: Teardown processing complete. ContainerID="3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b" Oct 2 19:08:06.487699 env[1146]: time="2023-10-02T19:08:06.487675144Z" level=info msg="TearDown network for sandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\" successfully" Oct 2 19:08:06.489031 env[1146]: time="2023-10-02T19:08:06.489014606Z" level=info msg="RemovePodSandbox \"3f01f853e178ce6d3d91c9254067fe51b98dd40a40c192ef102e22e1757d553b\" returns successfully" Oct 2 19:08:06.778642 env[1146]: time="2023-10-02T19:08:06.778618417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:08:07.043721 env[1146]: time="2023-10-02T19:08:07.043592638Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:07.048210 env[1146]: time="2023-10-02T19:08:07.048163043Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:07.048844 kubelet[2130]: E1002 19:08:07.048376 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:08:07.048844 kubelet[2130]: E1002 19:08:07.048400 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:08:07.048844 kubelet[2130]: E1002 19:08:07.048455 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-pxbgx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-rxwsl_calico-system(26015d97-edb0-46f0-bac2-de904a2f2b9a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:07.049302 env[1146]: time="2023-10-02T19:08:07.049281886Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:08:07.343902 env[1146]: time="2023-10-02T19:08:07.343808725Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:07.344333 env[1146]: time="2023-10-02T19:08:07.344301041Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:07.344602 kubelet[2130]: E1002 19:08:07.344530 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:08:07.344602 kubelet[2130]: E1002 19:08:07.344560 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:08:07.344681 kubelet[2130]: E1002 19:08:07.344648 2130 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-pxbgx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-rxwsl_calico-system(26015d97-edb0-46f0-bac2-de904a2f2b9a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:07.344916 kubelet[2130]: E1002 19:08:07.344904 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:08:08.155000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:08.157634 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:08:08.165868 kernel: audit: type=1400 audit(1696273688.155:1357): avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:08.165895 kernel: audit: type=1400 audit(1696273688.155:1358): avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:08.165911 kernel: audit: type=1300 audit(1696273688.155:1358): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b04520 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:08.155000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:08.155000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b04520 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:08.155000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:08.155000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ad0500 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:08.176034 kernel: audit: type=1327 audit(1696273688.155:1358): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:08.176069 kernel: audit: type=1300 audit(1696273688.155:1357): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ad0500 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:08.176086 kernel: audit: type=1327 audit(1696273688.155:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:08.155000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:08.161000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:08.182287 kernel: audit: type=1400 audit(1696273688.161:1359): avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:08.161000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ad0520 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:08.186277 kernel: audit: type=1300 audit(1696273688.161:1359): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ad0520 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:08.186312 kernel: audit: type=1327 audit(1696273688.161:1359): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:08.161000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:08.161000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:08.192509 kernel: audit: type=1400 audit(1696273688.161:1360): avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:08.161000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ad0540 a2=fc6 a3=0 items=0 ppid=1868 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c745 key=(null) Oct 2 19:08:08.161000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:08.330775 systemd[1]: run-containerd-runc-k8s.io-de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc-runc.6ULvsX.mount: Deactivated successfully. Oct 2 19:08:08.778480 env[1146]: time="2023-10-02T19:08:08.778441853Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:08:09.016115 env[1146]: time="2023-10-02T19:08:09.016080669Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:09.054396 env[1146]: time="2023-10-02T19:08:09.054318485Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:09.054861 kubelet[2130]: E1002 19:08:09.054568 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:08:09.054861 kubelet[2130]: E1002 19:08:09.054591 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:08:09.054861 kubelet[2130]: E1002 19:08:09.054656 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qtqss,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-58545cdf6-2kb9z_calico-apiserver(362b53f9-659f-4dcc-b76b-392a51c2d801): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:09.054861 kubelet[2130]: E1002 19:08:09.054678 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" podUID=362b53f9-659f-4dcc-b76b-392a51c2d801 Oct 2 19:08:09.328608 systemd[1]: run-containerd-runc-k8s.io-de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc-runc.FejcvA.mount: Deactivated successfully. Oct 2 19:08:10.779201 env[1146]: time="2023-10-02T19:08:10.779169431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:08:11.054771 env[1146]: time="2023-10-02T19:08:11.054672788Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:11.055072 env[1146]: time="2023-10-02T19:08:11.055044525Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:11.055265 kubelet[2130]: E1002 19:08:11.055245 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:08:11.055484 kubelet[2130]: E1002 19:08:11.055475 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:08:11.055632 kubelet[2130]: E1002 19:08:11.055623 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dh599,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-58545cdf6-8bqbr_calico-apiserver(1d4630ec-27ca-4875-8a11-552d76b5bbed): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:11.056001 kubelet[2130]: E1002 19:08:11.055993 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-58545cdf6-8bqbr" podUID=1d4630ec-27ca-4875-8a11-552d76b5bbed Oct 2 19:08:16.235624 systemd[1]: run-containerd-runc-k8s.io-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d-runc.89wYB6.mount: Deactivated successfully. Oct 2 19:08:18.334214 systemd[1]: run-containerd-runc-k8s.io-de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc-runc.dNDNn9.mount: Deactivated successfully. Oct 2 19:08:19.329814 systemd[1]: run-containerd-runc-k8s.io-de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc-runc.htC13O.mount: Deactivated successfully. Oct 2 19:08:20.778423 kubelet[2130]: E1002 19:08:20.778402 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:08:21.778671 kubelet[2130]: E1002 19:08:21.778656 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" podUID=362b53f9-659f-4dcc-b76b-392a51c2d801 Oct 2 19:08:22.778336 kubelet[2130]: E1002 19:08:22.778318 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-58545cdf6-8bqbr" podUID=1d4630ec-27ca-4875-8a11-552d76b5bbed Oct 2 19:08:24.017706 systemd[1]: Started sshd@7-139.178.70.107:22-86.109.11.97:57144.service. Oct 2 19:08:24.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.107:22-86.109.11.97:57144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:24.019875 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:08:24.019926 kernel: audit: type=1130 audit(1696273704.017:1361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.107:22-86.109.11.97:57144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:24.135000 audit[4537]: USER_ACCT pid=4537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.136634 sshd[4537]: Accepted publickey for core from 86.109.11.97 port 57144 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:08:24.139826 kernel: audit: type=1101 audit(1696273704.135:1362): pid=4537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.139000 audit[4537]: CRED_ACQ pid=4537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.140943 sshd[4537]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:24.146136 kernel: audit: type=1103 audit(1696273704.139:1363): pid=4537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.146180 kernel: audit: type=1006 audit(1696273704.139:1364): pid=4537 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:08:24.146198 kernel: audit: type=1300 audit(1696273704.139:1364): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6a15f010 a2=3 a3=0 items=0 ppid=1 pid=4537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.139000 audit[4537]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6a15f010 a2=3 a3=0 items=0 ppid=1 pid=4537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.147227 systemd[1]: Started session-10.scope. Oct 2 19:08:24.148103 systemd-logind[1135]: New session 10 of user core. Oct 2 19:08:24.148761 kernel: audit: type=1327 audit(1696273704.139:1364): proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:24.139000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:24.150000 audit[4537]: USER_START pid=4537 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.151000 audit[4539]: CRED_ACQ pid=4539 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.157883 kernel: audit: type=1105 audit(1696273704.150:1365): pid=4537 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.157913 kernel: audit: type=1103 audit(1696273704.151:1366): pid=4539 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.600583 sshd[4537]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:24.600000 audit[4537]: USER_END pid=4537 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.602490 systemd-logind[1135]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:08:24.603424 systemd[1]: sshd@7-139.178.70.107:22-86.109.11.97:57144.service: Deactivated successfully. Oct 2 19:08:24.603861 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:08:24.605037 systemd-logind[1135]: Removed session 10. Oct 2 19:08:24.605827 kernel: audit: type=1106 audit(1696273704.600:1367): pid=4537 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.605867 kernel: audit: type=1104 audit(1696273704.600:1368): pid=4537 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.600000 audit[4537]: CRED_DISP pid=4537 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:24.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.107:22-86.109.11.97:57144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:26.234843 systemd[1]: run-containerd-runc-k8s.io-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d-runc.QcUVZw.mount: Deactivated successfully. Oct 2 19:08:33.778646 env[1146]: time="2023-10-02T19:08:33.778619741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:08:34.040751 env[1146]: time="2023-10-02T19:08:34.040594281Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:34.045541 env[1146]: time="2023-10-02T19:08:34.045519392Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:34.045736 kubelet[2130]: E1002 19:08:34.045721 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:08:34.045934 kubelet[2130]: E1002 19:08:34.045748 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:08:34.045934 kubelet[2130]: E1002 19:08:34.045832 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-qtqss,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-58545cdf6-2kb9z_calico-apiserver(362b53f9-659f-4dcc-b76b-392a51c2d801): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:34.045934 kubelet[2130]: E1002 19:08:34.045856 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" podUID=362b53f9-659f-4dcc-b76b-392a51c2d801 Oct 2 19:08:34.604121 systemd[1]: Started sshd@8-139.178.70.107:22-86.109.11.97:53970.service. Oct 2 19:08:34.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.107:22-86.109.11.97:53970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:34.605347 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:08:34.605391 kernel: audit: type=1130 audit(1696273714.603:1370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.107:22-86.109.11.97:53970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:34.739000 audit[4632]: USER_ACCT pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:34.742860 sshd[4632]: Accepted publickey for core from 86.109.11.97 port 53970 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:08:34.744000 audit[4632]: CRED_ACQ pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:34.749263 kernel: audit: type=1101 audit(1696273714.739:1371): pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:34.749324 kernel: audit: type=1103 audit(1696273714.744:1372): pid=4632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:34.749347 kernel: audit: type=1006 audit(1696273714.744:1373): pid=4632 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 19:08:34.744000 audit[4632]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2019eba0 a2=3 a3=0 items=0 ppid=1 pid=4632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:34.752068 sshd[4632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:34.756188 kernel: audit: type=1300 audit(1696273714.744:1373): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2019eba0 a2=3 a3=0 items=0 ppid=1 pid=4632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:34.744000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:34.757866 kernel: audit: type=1327 audit(1696273714.744:1373): proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:34.768879 systemd[1]: Started session-11.scope. Oct 2 19:08:34.769258 systemd-logind[1135]: New session 11 of user core. Oct 2 19:08:34.772000 audit[4632]: USER_START pid=4632 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:34.779048 kernel: audit: type=1105 audit(1696273714.772:1374): pid=4632 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:34.779094 kernel: audit: type=1103 audit(1696273714.777:1375): pid=4634 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:34.777000 audit[4634]: CRED_ACQ pid=4634 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:34.779151 env[1146]: time="2023-10-02T19:08:34.778397721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:08:35.012446 env[1146]: time="2023-10-02T19:08:35.012394277Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:35.012768 env[1146]: time="2023-10-02T19:08:35.012739177Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:35.012918 kubelet[2130]: E1002 19:08:35.012901 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:08:35.012959 kubelet[2130]: E1002 19:08:35.012928 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:08:35.013003 kubelet[2130]: E1002 19:08:35.012990 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-dh599,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-58545cdf6-8bqbr_calico-apiserver(1d4630ec-27ca-4875-8a11-552d76b5bbed): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:35.013083 kubelet[2130]: E1002 19:08:35.013026 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-58545cdf6-8bqbr" podUID=1d4630ec-27ca-4875-8a11-552d76b5bbed Oct 2 19:08:35.049457 sshd[4632]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:35.057150 kernel: audit: type=1106 audit(1696273715.049:1376): pid=4632 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:35.069658 kernel: audit: type=1104 audit(1696273715.050:1377): pid=4632 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:35.049000 audit[4632]: USER_END pid=4632 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:35.050000 audit[4632]: CRED_DISP pid=4632 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:35.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.107:22-86.109.11.97:53970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:35.054309 systemd[1]: sshd@8-139.178.70.107:22-86.109.11.97:53970.service: Deactivated successfully. Oct 2 19:08:35.054745 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:08:35.057323 systemd-logind[1135]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:08:35.057763 systemd-logind[1135]: Removed session 11. Oct 2 19:08:35.778945 env[1146]: time="2023-10-02T19:08:35.778714527Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:08:36.043758 env[1146]: time="2023-10-02T19:08:36.043517557Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:36.044399 env[1146]: time="2023-10-02T19:08:36.044376283Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:36.044622 kubelet[2130]: E1002 19:08:36.044608 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:08:36.044829 kubelet[2130]: E1002 19:08:36.044637 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:08:36.044829 kubelet[2130]: E1002 19:08:36.044705 2130 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-pxbgx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-rxwsl_calico-system(26015d97-edb0-46f0-bac2-de904a2f2b9a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:36.045386 env[1146]: time="2023-10-02T19:08:36.045358514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:08:36.234383 systemd[1]: run-containerd-runc-k8s.io-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d-runc.rcd4Rc.mount: Deactivated successfully. Oct 2 19:08:36.268092 env[1146]: time="2023-10-02T19:08:36.268059484Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:36.268472 env[1146]: time="2023-10-02T19:08:36.268453222Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:36.268704 kubelet[2130]: E1002 19:08:36.268686 2130 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:08:36.268746 kubelet[2130]: E1002 19:08:36.268713 2130 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:08:36.268791 kubelet[2130]: E1002 19:08:36.268781 2130 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-pxbgx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-rxwsl_calico-system(26015d97-edb0-46f0-bac2-de904a2f2b9a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:36.268966 kubelet[2130]: E1002 19:08:36.268954 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:08:38.333948 systemd[1]: run-containerd-runc-k8s.io-de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc-runc.Yw5v1b.mount: Deactivated successfully. Oct 2 19:08:39.332483 systemd[1]: run-containerd-runc-k8s.io-de9f616fba1439dcadc7c872850a4a608329ff943200e9bb382770a2330532cc-runc.YwttA7.mount: Deactivated successfully. Oct 2 19:08:44.778891 kubelet[2130]: E1002 19:08:44.778858 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-58545cdf6-2kb9z" podUID=362b53f9-659f-4dcc-b76b-392a51c2d801 Oct 2 19:08:45.054182 systemd[1]: Started sshd@9-139.178.70.107:22-86.109.11.97:51328.service. Oct 2 19:08:45.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.107:22-86.109.11.97:51328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.058877 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:08:45.058925 kernel: audit: type=1130 audit(1696273725.054:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.107:22-86.109.11.97:51328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.118000 audit[4713]: USER_ACCT pid=4713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.119928 sshd[4713]: Accepted publickey for core from 86.109.11.97 port 51328 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:08:45.122000 audit[4713]: CRED_ACQ pid=4713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.126702 kernel: audit: type=1101 audit(1696273725.118:1380): pid=4713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.126737 kernel: audit: type=1103 audit(1696273725.122:1381): pid=4713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.126758 kernel: audit: type=1006 audit(1696273725.122:1382): pid=4713 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:08:45.126955 sshd[4713]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:45.122000 audit[4713]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb4b0b9a0 a2=3 a3=0 items=0 ppid=1 pid=4713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.131943 kernel: audit: type=1300 audit(1696273725.122:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb4b0b9a0 a2=3 a3=0 items=0 ppid=1 pid=4713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.122000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:45.133100 kernel: audit: type=1327 audit(1696273725.122:1382): proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:45.135748 systemd[1]: Started session-12.scope. Oct 2 19:08:45.136886 systemd-logind[1135]: New session 12 of user core. Oct 2 19:08:45.138000 audit[4713]: USER_START pid=4713 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.142000 audit[4715]: CRED_ACQ pid=4715 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.146470 kernel: audit: type=1105 audit(1696273725.138:1383): pid=4713 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.146499 kernel: audit: type=1103 audit(1696273725.142:1384): pid=4715 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.258929 sshd[4713]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:45.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.107:22-86.109.11.97:51342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.261422 systemd[1]: Started sshd@10-139.178.70.107:22-86.109.11.97:51342.service. Oct 2 19:08:45.264937 kernel: audit: type=1130 audit(1696273725.260:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.107:22-86.109.11.97:51342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.264000 audit[4713]: USER_END pid=4713 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.268858 kernel: audit: type=1106 audit(1696273725.264:1386): pid=4713 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.268000 audit[4713]: CRED_DISP pid=4713 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.107:22-86.109.11.97:51328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.270099 systemd[1]: sshd@9-139.178.70.107:22-86.109.11.97:51328.service: Deactivated successfully. Oct 2 19:08:45.270560 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:08:45.271091 systemd-logind[1135]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:08:45.271599 systemd-logind[1135]: Removed session 12. Oct 2 19:08:45.290000 audit[4724]: USER_ACCT pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.291826 sshd[4724]: Accepted publickey for core from 86.109.11.97 port 51342 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:08:45.291000 audit[4724]: CRED_ACQ pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.291000 audit[4724]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0a9ad790 a2=3 a3=0 items=0 ppid=1 pid=4724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.291000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:45.292824 sshd[4724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:45.295194 systemd-logind[1135]: New session 13 of user core. Oct 2 19:08:45.295651 systemd[1]: Started session-13.scope. Oct 2 19:08:45.297000 audit[4724]: USER_START pid=4724 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.298000 audit[4727]: CRED_ACQ pid=4727 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.800073 systemd[1]: Started sshd@11-139.178.70.107:22-86.109.11.97:51344.service. Oct 2 19:08:45.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.107:22-86.109.11.97:51344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.814579 sshd[4724]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:45.815000 audit[4724]: USER_END pid=4724 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.815000 audit[4724]: CRED_DISP pid=4724 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.824559 systemd-logind[1135]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:08:45.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.107:22-86.109.11.97:51342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.825386 systemd[1]: sshd@10-139.178.70.107:22-86.109.11.97:51342.service: Deactivated successfully. Oct 2 19:08:45.825912 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:08:45.826722 systemd-logind[1135]: Removed session 13. Oct 2 19:08:45.862000 audit[4733]: USER_ACCT pid=4733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.863541 sshd[4733]: Accepted publickey for core from 86.109.11.97 port 51344 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:08:45.863000 audit[4733]: CRED_ACQ pid=4733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.863000 audit[4733]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9e9c6d40 a2=3 a3=0 items=0 ppid=1 pid=4733 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:45.864655 sshd[4733]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:45.870529 systemd-logind[1135]: New session 14 of user core. Oct 2 19:08:45.871034 systemd[1]: Started session-14.scope. Oct 2 19:08:45.873000 audit[4733]: USER_START pid=4733 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.874000 audit[4736]: CRED_ACQ pid=4736 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.978522 sshd[4733]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:45.978000 audit[4733]: USER_END pid=4733 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.978000 audit[4733]: CRED_DISP pid=4733 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:45.980299 systemd-logind[1135]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:08:45.980365 systemd[1]: sshd@11-139.178.70.107:22-86.109.11.97:51344.service: Deactivated successfully. Oct 2 19:08:45.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.107:22-86.109.11.97:51344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.980781 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:08:45.981277 systemd-logind[1135]: Removed session 14. Oct 2 19:08:47.779181 kubelet[2130]: E1002 19:08:47.779157 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rxwsl" podUID=26015d97-edb0-46f0-bac2-de904a2f2b9a Oct 2 19:08:49.779365 kubelet[2130]: E1002 19:08:49.779340 2130 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-58545cdf6-8bqbr" podUID=1d4630ec-27ca-4875-8a11-552d76b5bbed Oct 2 19:08:55.982679 systemd[1]: Started sshd@12-139.178.70.107:22-86.109.11.97:37528.service. Oct 2 19:08:55.997260 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:08:55.997296 kernel: audit: type=1130 audit(1696273735.982:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.107:22-86.109.11.97:37528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.107:22-86.109.11.97:37528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.009000 audit[4821]: USER_ACCT pid=4821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.013899 sshd[4821]: Accepted publickey for core from 86.109.11.97 port 37528 ssh2: RSA SHA256:4HsabNeLOY7T7hq+vAGv8q6phBRuHhOefapqVnqBG5k Oct 2 19:08:56.014000 audit[4821]: CRED_ACQ pid=4821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.016100 sshd[4821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:56.019810 kernel: audit: type=1101 audit(1696273736.009:1407): pid=4821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.019854 kernel: audit: type=1103 audit(1696273736.014:1408): pid=4821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.022817 kernel: audit: type=1006 audit(1696273736.015:1409): pid=4821 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:08:56.015000 audit[4821]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf8546a40 a2=3 a3=0 items=0 ppid=1 pid=4821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.027137 kernel: audit: type=1300 audit(1696273736.015:1409): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf8546a40 a2=3 a3=0 items=0 ppid=1 pid=4821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:56.028939 kernel: audit: type=1327 audit(1696273736.015:1409): proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:56.032555 systemd[1]: Started session-15.scope. Oct 2 19:08:56.032782 systemd-logind[1135]: New session 15 of user core. Oct 2 19:08:56.037000 audit[4821]: USER_START pid=4821 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.042980 kernel: audit: type=1105 audit(1696273736.037:1410): pid=4821 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.041000 audit[4823]: CRED_ACQ pid=4823 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.046848 kernel: audit: type=1103 audit(1696273736.041:1411): pid=4823 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.145111 sshd[4821]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:56.144000 audit[4821]: USER_END pid=4821 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.152188 kernel: audit: type=1106 audit(1696273736.144:1412): pid=4821 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.152223 kernel: audit: type=1104 audit(1696273736.144:1413): pid=4821 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.144000 audit[4821]: CRED_DISP pid=4821 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=86.109.11.97 addr=86.109.11.97 terminal=ssh res=success' Oct 2 19:08:56.150561 systemd-logind[1135]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:08:56.151401 systemd[1]: sshd@12-139.178.70.107:22-86.109.11.97:37528.service: Deactivated successfully. Oct 2 19:08:56.151836 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:08:56.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.107:22-86.109.11.97:37528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:56.152760 systemd-logind[1135]: Removed session 15. Oct 2 19:08:56.244909 systemd[1]: run-containerd-runc-k8s.io-b9a1e24637cfd9aeb3f5705efa7381c94dbc7fd39c368049f72313019e64288d-runc.6RtcLr.mount: Deactivated successfully.